--client-cert-auth argument is set to true
Incident Management is now generally available! Incident Management is now generally available!
<  Back to rules search

--client-cert-auth argument is set to true

kubernetes

Classification:

compliance

Framework:

cis-kubernetes

Control:

2.2

Set up the kubernetes integration.

Overview

Description

Enable client authentication on etcd service.

Rationale

Etcd is a highly-available key value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should not be available to unauthenticated clients. You should enable the client authentication via valid certificates to secure the access to the etcd service.

Audit

Run the following command on the etcd server node:

ps -ef | grep etcd

Verify that the --client-cert-auth argument is set to true.

Remediation

Edit the etcd pod specification file /etc/kubernetes/manifests/etcd.yaml on the master node and set the below parameter:

--client-cert-auth="true"

Impact

All clients attempting to access the etcd server will require a valid client certificate.

Default Value

By default, the etcd service can be queried by unauthenticated clients.

References

  1. [https://coreos.com/etcd/docs/latest/op-guide/security.html ][`]
  2. https://kubernetes.io/docs/admin/etcd/
  3. https://coreos.com/etcd/docs/latest/op-guide/configuration.html#client-cert-auth

CIS Controls

Version 6 14 Controlled Access Based on the Need to Know Controlled Access Based on the Need to Know Version 7 4 Controlled Use of Administrative Privileges Controlled Use of Administrative Privileges