7.8 Ensure that node certificates are rotated as appropriate

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

You should rotate swarm node certificates in line with your organizational security policy.

Rationale:

Docker Swarm uses TLS for clustering operations between its nodes. Certificate rotation ensures that in an event such as a compromised node or key, it is difficult to impersonate a node. By default, node certificates are rotated every 90 days, but you should rotate them more often or as appropriate in your environment.

Impact:

None

Solution

You should run the command to set the desired expiry time on the node certificate.
For example:

docker swarm update --cert-expiry 48h

Default Value:

By default, node certificates are rotated automatically every 90 days.

See Also

https://workbench.cisecurity.org/files/4244