Skip to content

Rancher Government Solutions RKE2 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000141-CTR-000315

    Group
  • SRG-APP-000142-CTR-000325

    Group
  • SRG-APP-000171-CTR-000435

    Group
  • Rancher RKE2 must store only cryptographic representations of passwords.

    Secrets, such as passwords, keys, tokens, and certificates should not be stored as environment variables. These environment variables are accessible inside RKE2 by the "Get Pod" API call, and by an...
    Rule Medium Severity
  • SRG-APP-000190-CTR-000500

    Group
  • SRG-APP-000233-CTR-000585

    Group
  • Rancher RKE2 runtime must isolate security functions from nonsecurity functions.

    RKE2 runs as isolated as possible. RKE2 is a container-based Kubernetes distribution. A container image is essentially a complete and executable version of an application, which relies only on the...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    Group
  • SRG-APP-000340-CTR-000770

    Group
  • Rancher RKE2 must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    Admission controllers intercept requests to the Kubernetes API before an object is instantiated. Enabling the admissions webhook allows for Kubernetes to apply policies against objects that are to ...
    Rule Medium Severity
  • SRG-APP-000378-CTR-000880

    Group
  • SRG-APP-000429-CTR-001060

    Group
  • SRG-APP-000454-CTR-001110

    Group
  • SRG-APP-000456-CTR-001125

    Group
  • SRG-APP-000131-CTR-000285

    Group
  • Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to modify an exi...
    Rule Medium Severity
  • The Kubernetes Kubelet must have anonymous authentication disabled.

    RKE2 registry is used to store images and is the keeper of truth for trusted images within the platform. To guarantee the images' integrity, access to the registry must be limited to those individu...
    Rule Medium Severity
  • The Kubernetes Kubelet must have the read-only port flag disabled.

    Kubelet serves a small REST API with read access to port 10255. The read-only port for Kubernetes provides no authentication or authorization security control. Providing unrestricted access on port...
    Rule High Severity
  • Configuration and authentication files for Rancher RKE2 must be protected.

    There are various configuration files, logs, access credentials, and other files stored on the host filesystem that contain sensitive information. These files could potentially put at risk, along...
    Rule Medium Severity
  • Rancher RKE2 must be configured with only essential configurations.

    It is important to disable any unnecessary components to reduce any potential attack surfaces. RKE2 allows disabling the following components: - rke2-canal - rke2-coredns - rke2-ingress-nginx - r...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules