Rancher Government Solutions RKE2 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000141-CTR-000315
Group -
SRG-APP-000142-CTR-000325
Group -
SRG-APP-000171-CTR-000435
Group -
Rancher RKE2 must store only cryptographic representations of passwords.
Secrets, such as passwords, keys, tokens, and certificates should not be stored as environment variables. These environment variables are accessible inside RKE2 by the "Get Pod" API call, and by an...Rule Medium Severity -
SRG-APP-000190-CTR-000500
Group -
SRG-APP-000233-CTR-000585
Group -
Rancher RKE2 runtime must isolate security functions from nonsecurity functions.
RKE2 runs as isolated as possible. RKE2 is a container-based Kubernetes distribution. A container image is essentially a complete and executable version of an application, which relies only on the...Rule Medium Severity -
SRG-APP-000243-CTR-000600
Group -
SRG-APP-000340-CTR-000770
Group -
Rancher RKE2 must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Admission controllers intercept requests to the Kubernetes API before an object is instantiated. Enabling the admissions webhook allows for Kubernetes to apply policies against objects that are to ...Rule Medium Severity -
SRG-APP-000378-CTR-000880
Group -
SRG-APP-000429-CTR-001060
Group -
SRG-APP-000454-CTR-001110
Group -
SRG-APP-000456-CTR-001125
Group -
SRG-APP-000131-CTR-000285
Group -
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to modify an exi...Rule Medium Severity -
The Kubernetes Kubelet must have anonymous authentication disabled.
RKE2 registry is used to store images and is the keeper of truth for trusted images within the platform. To guarantee the images' integrity, access to the registry must be limited to those individu...Rule Medium Severity -
The Kubernetes Kubelet must have the read-only port flag disabled.
Kubelet serves a small REST API with read access to port 10255. The read-only port for Kubernetes provides no authentication or authorization security control. Providing unrestricted access on port...Rule High Severity -
Configuration and authentication files for Rancher RKE2 must be protected.
There are various configuration files, logs, access credentials, and other files stored on the host filesystem that contain sensitive information. These files could potentially put at risk, along...Rule Medium Severity -
Rancher RKE2 must be configured with only essential configurations.
It is important to disable any unnecessary components to reduce any potential attack surfaces. RKE2 allows disabling the following components: - rke2-canal - rke2-coredns - rke2-ingress-nginx - r...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.