etcd data directory permissions are set to 700 or more restrictive
Incident Management is now generally available! Incident Management is now generally available!
<  Back to rules search

etcd data directory permissions are set to 700 or more restrictive

kubernetes

Classification:

compliance

Framework:

cis-kubernetes

Control:

1.1.11

Set up the kubernetes integration.

Overview

Description

Ensure that the etcd data directory has permissions of 700 or more restrictive.

Rationale

etcd is a highly-available key-value store used by Kubernetes deployments for persistent storage of all of its REST API objects. This data directory should be protected from any unauthorized reads or writes. It should not be readable or writable by any group members or the world.

Audit

On the etcd server node, get the etcd data directory passed as an argument --data-dir, from the command:

ps -ef | grep etcd

Based on the etcd data directory found above, run the command:

stat -c %a /var/lib/etcd

Verify the permissions are 700 or more restrictive.

Remediation

On the etcd server node, get the etcd data directory, passed as an argument --data-dir, from the below command: ps -ef | grep etcd

Run the command (based on the etcd data directory found above): chmod 700 /var/lib/etcd

Impact

None

Default Value

By default, etcd data directory has permissions of 755.

References

  1. https://coreos.com/etcd/docs/latest/op-guide/configuration.html#data-dir
  2. https://kubernetes.io/docs/admin/etcd/

CIS Controls

Version 6

14 Controlled Access Based on the Need to Know

Version 7

5.2 Maintain Secure Images - Maintain secure images or templates for all systems in the enterprise based on the organization’s approved configuration standards. Any new system deployment or existing system that becomes compromised should be imaged using one of those images or templates.