Profile applicability: Level 1 - Master Node
Do not use automatically generated self-signed certificates for TLS connections between
               peers.
etcd is a highly-available key value store used by Kubernetes deployments for persistent
               storage of all of its REST API objects. These objects are sensitive in nature and
               should be
               accessible only by authenticated etcd peers in the etcd cluster. Therefore, do not
               use
               self-signed certificates for authentication.
|  | NoteThis recommendation is applicable only for etcd clusters. If you are using only one
                              etcd
                              server in your environment then this recommendation is not applicable. | 
|  | NoteBy default,  --peer-auto-tlsargument is set tofalse. | 
Impact
All peers attempting to communicate with the etcd server will require a valid client
                  certificate for authentication.
Audit
Run the following command on the etcd server node:
ps -ef | grep etcd
Verify that if the 
--peer-auto-tls argument exists, it is not set to
                  true.Remediation
Edit the etcd pod specification file 
/etc/kubernetes/manifests/etcd.yaml on
                  the master node and either remove the --peer-auto-tls parameter or set it to
                  false.--peer-auto-tls=false
 
		