1.5.3 Ensure that the --auto-tls argument is not set to true

Information

Do not use self-signed certificates for TLS.

Rationale:

etcd is a highly-available key value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should not be available to unauthenticated clients. You should enable the client authentication via valid certificates to secure the access to the etcd service.

Solution

Edit the etcd environment file (for example, `/etc/etcd/etcd.conf`) on the etcd server node and comment out the `ETCD_AUTO_TLS` parameter. `#ETCD_AUTO_TLS='true'`

Edit the etcd startup file (for example, `/etc/systemd/system/multi-user.target.wants/etcd.service`) and remove the startup parameter for `--auto-tls`. Based on your system, reload the daemon and restart the `etcd` service. For example, `systemctl daemon-reload systemctl restart etcd.service`

Impact:

Clients will not be able to use self-signed certificates for TLS.

See Also

https://workbench.cisecurity.org/files/1738

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(2), CSCv6|14.2

Plugin: Unix

Control ID: 2a62958ff6d7df5160a7fedbf0c1645c271a987c5a6a5307e9dc24f5652ed1b7