Etcd service should have client authentication enabled
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Description
Enable client authentication on etcd service.
Rationale
Etcd is a highly-available key value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should not be available to unauthenticated clients. You should enable the client authentication via valid certificates to secure the access to the etcd service.
Audit
Run the following command on the etcd server node:
Verify that the --client-cert-auth
argument is set to true
.
Edit the etcd pod specification file /etc/kubernetes/manifests/etcd.yaml
on the master node and set the below parameter:
--client-cert-auth="true"
Impact
All clients attempting to access the etcd server will require a valid client certificate.
Default value
By default, the etcd service can be queried by unauthenticated clients.
References
- [https://coreos.com/etcd/docs/latest/op-guide/security.html ][`]
- https://kubernetes.io/docs/admin/etcd/
- https://coreos.com/etcd/docs/latest/op-guide/configuration.html#client-cert-auth
CIS controls
Version 6 14 Controlled Access Based on the Need to Know Controlled Access Based on the Need to Know Version 7 4 Controlled Use of Administrative Privileges Controlled Use of Administrative Privileges