Rancher Government Solutions RKE2 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000033-CTR-000095
Group -
SRG-APP-000033-CTR-000095
Group -
The Kubernetes API server must have the insecure bind address not set.
By default, the API server will listen on two ports and addresses. One address is the secure address and the other address is called the "insecure bind" address and is set by default to localhost. ...Rule High Severity -
SRG-APP-000033-CTR-000095
Group -
The Kubernetes kubelet must enable explicit authorization.
Kubelet is the primary agent on each node. The API server communicates with each kubelet to perform tasks such as starting/stopping pods. By default, kubelets allow all authenticated requests, even...Rule High Severity -
SRG-APP-000033-CTR-000100
Group -
The Kubernetes API server must have anonymous authentication disabled.
The Kubernetes API Server controls Kubernetes via an API interface. A user who has access to the API essentially has root access to the entire Kubernetes cluster. To control access, users must be a...Rule High Severity -
SRG-APP-000100-CTR-000200
Group -
All audit records must identify any containers associated with the event within Rancher RKE2.
Ensure that the --audit-log-maxage argument is set to 30 or as appropriate. Retaining logs for at least 30 days ensures that you can go back in time and investigate or correlate any events. Set yo...Rule Medium Severity -
SRG-APP-000133-CTR-000300
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules