Verify Permissions on the Etcd PKI Certificate Files
An XCCDF Rule
Description
To properly set the permissions of /etc/kubernetes/static-pod-resources/etcd-*/secrets/*/*.crt
, run the command:
$ sudo chmod 0600 /etc/kubernetes/static-pod-resources/etcd-*/secrets/*/*.crt
warning alert: Dependency Warning
This rule is only applicable for nodes that run the Etcd service.
The aforementioned service is only running on the nodes labeled
"master" by default.
Rationale
OpenShift makes use of a number of certificate files as part of the operation of its components. The permissions on these files should be set to
600or more restrictive to protect their integrity.
- ID
- xccdf_org.ssgproject.content_rule_file_permissions_etcd_pki_cert_files
- Severity
- Medium
- References
- Updated