Skip to content

Rancher Government Solutions RKE2 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000014-CTR-000035

    Group
  • Rancher RKE2 must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.

    Use strong TLS settings. RKE2 uses FIPS validated BoringCrypto modules. RKE2 Server can prohibit the use of SSL and unauthorized versions of TLS protocols to properly secure communication. There i...
    Rule High Severity
  • SRG-APP-000023-CTR-000055

    Group
  • RKE2 must use a centralized user management solution to support account management functions.

    The Kubernetes Controller Manager is a background process that embeds core control loops regulating cluster system state through the API Server. Every process executed in a pod has an associated se...
    Rule Medium Severity
  • SRG-APP-000026-CTR-000070

    Group
  • SRG-APP-000033-CTR-000090

    Group
  • The Kubernetes Controller Manager must have secure binding.

    Limiting the number of attack vectors and implementing authentication and encryption on the endpoints available to external sources is paramount when securing the overall Kubernetes cluster. The Co...
    Rule Medium Severity
  • SRG-APP-000033-CTR-000090

    Group
  • SRG-APP-000033-CTR-000095

    Group
  • The Kubernetes API server must have the insecure port flag disabled.

    By default, the API server will listen on two ports. One port is the secure port and the other port is called the "localhost port". This port is also called the "insecure port", port 8080. Any requ...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules