2.1 Ensure that the --cert-file and --key-file arguments are set as appropriate

Information

Configure TLS encryption for the etcd service.

etcd is a highly-available key value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should be encrypted in transit.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

OpenShift does not use the etcd-certfile or etcd-keyfil e flags. Certificates for etcd are managed by the etcd cluster operator.

Impact:

Client connections only over TLS would be served.

See Also

https://workbench.cisecurity.org/benchmarks/19464

Item Details

Category: IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|IA-5(1), 800-53|SC-28, 800-53|SC-28(1), CSCv7|14.4

Plugin: OpenShift

Control ID: 9d7056aa4329ca6e0eef8954653d58a78a9155f2bc21dd2e274e38957bbccf1f