2.1 Ensure that the --cert-file and --key-file arguments are set as appropriate

Information

Configure TLS encryption for the etcd service.

Rationale:

etcd is a highly-available key value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should be encrypted in transit.

Impact:

Client connections only over TLS would be served.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

OpenShift does not use the etcd-certfile or etcd-keyfile flags. Certificates for etcd are managed by the etcd cluster operator.

Default Value:

By default, etcd communication is secured with X.509 certificates.

See Also

https://workbench.cisecurity.org/benchmarks/16094

Item Details

Category: IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|IA-5(1), 800-53|SC-28, 800-53|SC-28(1), CSCv7|14.4

Plugin: OpenShift

Control ID: 7b6416d97b16485ff0c58f5622153f9c9e2647304e8fed23bac86c3575b13477