UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Kubernetes etcd must use TLS to protect the confidentiality of sensitive data during electronic dissemination.


Overview

Finding ID Version Rule ID IA Controls Severity
V-242379 CNTR-K8-000180 SV-242379r960759_rule Medium
Description
Kubernetes etcd will prohibit the use of SSL and unauthorized versions of TLS protocols to properly secure communication. The use of unsupported protocol exposes vulnerabilities to the Kubernetes by rogue traffic interceptions, man-in-the-middle attacks, and impersonation of users or services from the container platform runtime, registry, and keystore. To enable the minimum version of TLS to be used by the Kubernetes API Server, the setting "--auto-tls" must be set.
STIG Date
Kubernetes Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-45654r927069_chk )
Change to the /etc/kubernetes/manifests directory on the Kubernetes Control Plane. Run the command:

grep -i auto-tls *

If the setting "--auto-tls" is not configured in the Kubernetes etcd manifest file or it is set to true, this is a finding.
Fix Text (F-45612r927070_fix)
Edit the Kubernetes etcd manifest file in the /etc/kubernetes/manifests directory on the Kubernetes Control Plane.

Set the value of "--auto-tls" to "false".