2.1 Ensure that the --cert-file and --key-file arguments are set as appropriate
Information
Configure TLS encryption for the etcd service. Rationale: etcd is a highly-available key value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should be encrypted in transit. Impact: Client connections only over TLS would be served. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
OpenShift does not use the etcd-certfile or etcd-keyfile flags. Certificates for etcd are managed by the etcd cluster operator. Default Value: By default, etcd communication is secured with X.509 certificates.