1. Home
  2. Security Hardening
  3. CIS Kubernetes V1.20 Benchmark V1.0.0 L1 Master
  4. Ensure that the etcd pod specification file permissions are set to 644 or more restrictive

Ensure that the etcd pod specification file permissions are set to 644 or more restrictive

Details

Ensure that the /etc/kubernetes/manifests/etcd.yaml file has permissions of 644 or more restrictive.

Rationale:

The etcd pod specification file /etc/kubernetes/manifests/etcd.yaml controls various parameters that set the behavior of the etcd service in the master node. etcd is a highly-available key-value store which Kubernetes uses for persistent storage of all of its REST API object. You should restrict its file permissions to maintain the integrity of the file. The file should be writable by only the administrators on the system.

Impact:

None

Solution

Run the below command (based on the file location on your system) on the master node. For example,

chmod 644 /etc/kubernetes/manifests/etcd.yaml

Default Value:

By default, /etc/kubernetes/manifests/etcd.yaml file has permissions of 640.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles