Etcd service should have client authentication enabled

kubernetes

Classification:

compliance

Framework:

cis-kubernetes

Control:

2.2

Set up the kubernetes integration.

Description

Enable client authentication on etcd service.

Rationale

Etcd is a highly-available key value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should not be available to unauthenticated clients. You should enable the client authentication via valid certificates to secure the access to the etcd service.

Audit

Run the following command on the etcd server node:

ps -ef | grep etcd

Verify that the --client-cert-auth argument is set to true.

Remediation

Edit the etcd pod specification file /etc/kubernetes/manifests/etcd.yaml on the master node and set the below parameter:

--client-cert-auth="true"

Impact

All clients attempting to access the etcd server will require a valid client certificate.

Default value

By default, the etcd service can be queried by unauthenticated clients.

References

  1. [https://coreos.com/etcd/docs/latest/op-guide/security.html ][`]
  2. https://kubernetes.io/docs/admin/etcd/
  3. https://coreos.com/etcd/docs/latest/op-guide/configuration.html#client-cert-auth

CIS controls

Version 6 14 Controlled Access Based on the Need to Know Controlled Access Based on the Need to Know Version 7 4 Controlled Use of Administrative Privileges Controlled Use of Administrative Privileges

PREVIEWING: esther/docs-9478-fix-split-after-example