1.5.6 Ensure that the --peer-auto-tls argument is not set to true

Information

Do not use automatically generated self-signed certificates for TLS connections between peers.

Rationale:

etcd is a highly-available key value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should be accessible only by authenticated etcd peers in the etcd cluster. Hence, do not use self-signed certificates for authentication.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Edit the etcd pod specification file '/etc/kubernetes/manifests/etcd.yaml' on the master node and either remove the '--peer-auto-tls' parameter or set it to 'false'.

--peer-auto-tls=false

Impact:

All peers attempting to communicate with the etcd server will require a valid client certificate for authentication.

See Also

https://workbench.cisecurity.org/files/2125

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(2), CSCv6|14

Plugin: Unix

Control ID: b0c41a71545698f52a4754987e10d6f1b61e3a98a999b833c13a6f7c628aefea