2.1 Ensure that the --cert-file and --key-file arguments are set as appropriate - key

Information

Configure TLS encryption for the etcd service.

Rationale:

etcd is a highly-available key value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should be encrypted in transit.

Impact:

Client connections only over TLS would be served.

Solution

Follow the etcd service documentation and configure TLS encryption.
Then, edit the etcd pod specification file /etc/kubernetes/manifests/etcd.yaml on the master node and set the below parameters.

--cert-file=</path/to/ca-file>
--key-file=</path/to/key-file>

Default Value:

By default, TLS encryption is not set.

See Also

https://workbench.cisecurity.org/files/3891

Item Details

Category: IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|IA-5(1), 800-53|SC-28, 800-53|SC-28(1), CSCv7|14.4

Plugin: Unix

Control ID: ae6878fcfadc464e14bb63fa50a29a030851446417e2bbd58d3c72d9ec459c27