Under active development Content is continuously updated and improved

V-242379The Kubernetes etcd must use TLS to protect the confidentiality of sensitive data during electronic dissemination.

CAT II - Medium
CNTR-K8-000180

>Control Description

Kubernetes etcd will prohibit the use of SSL and unauthorized versions of TLS protocols to properly secure communication. The use of unsupported protocol exposes vulnerabilities to the Kubernetes by rogue traffic interceptions, man-in-the-middle attacks, and impersonation of users or services from the container platform runtime, registry, and keystore. To enable the minimum version of TLS to be used by the Kubernetes API Server, the setting "--auto-tls" must be set.

>Check Content

Change to the /etc/kubernetes/manifests directory on the Kubernetes Control Plane.

$grep -i auto-tls *

If the setting "--auto-tls" is not configured in the Kubernetes etcd manifest file or it is set to true, this is a finding.

>Remediation

Edit the Kubernetes etcd manifest file in the /etc/kubernetes/manifests directory on the Kubernetes Control Plane. Set the value of "--auto-tls" to "false".

>CCI References

Control Correlation Identifiers (CCIs) map STIG findings to NIST 800-53 controls.

>Cross-Framework Mappings

NIST SP 800-53 r5

via DISA CCI List

Ask AI

Configure your API key to use AI features.