2.3 Ensure that the --auto-tls argument is not set to true

Information

Do not use self-signed certificates for TLS.

etcd is a highly-available key value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should not be available to unauthenticated clients. You should enable the client authentication via valid certificates to secure the access to the etcd service.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

This setting is managed by the cluster etcd operator. No remediation required.

Impact:

Clients will not be able to use self-signed certificates for TLS.

See Also

https://workbench.cisecurity.org/benchmarks/19464

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-5, 800-53|IA-5(1), 800-53|SC-8, 800-53|SC-8(1), CSCv7|14.4

Plugin: OpenShift

Control ID: 8f38c04d6d5d7eef6ee3a7949a890c9e29f4d1883d0bff9ceefbba59c3716851