STIGQter STIGQter: STIG Summary: Kubernetes Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 13 Apr 2021:

Kubernetes etcd must have a peer-key-file set for secure communication.

DISA Rule

SV-242433r712655_rule

Vulnerability Number

V-242433

Group Title

SRG-APP-000219-CTR-000550

Rule Version

CNTR-K8-001550

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the Kubernetes etcd manifest file in the /etc/kubernetes/manifests directory on the Kubernetes Master Node. Set the value of "--peer-key-file" to the certificate to be used for communication with etcd.

Check Contents

Change to the /etc/kubernetes/manifests directory on the Kubernetes Master Node. Run the command:

grep -i peer-key-file *

If the setting "peer-key-file" is not set in the Kubernetes etcd manifest file, this is a finding.

Vulnerability Number

V-242433

Documentable

False

Rule Version

CNTR-K8-001550

Severity Override Guidance

Change to the /etc/kubernetes/manifests directory on the Kubernetes Master Node. Run the command:

grep -i peer-key-file *

If the setting "peer-key-file" is not set in the Kubernetes etcd manifest file, this is a finding.

Check Content Reference

M

Target Key

5376

Comments