Skip to content

Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000023-CTR-000055

    Group
  • Rancher MCM must use a centralized user management solution to support account management functions. For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.

    RBAC Integration and Authn/Authz Centralized authentication services provide additional functionality fulfilling security requirements: - Multi-factor authentication, which is compatible with Ranc...
    Rule High Severity
  • Rancher MCM must never automatically remove or disable emergency accounts.

    Emergency accounts are administrator accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation ...
    Rule Medium Severity
  • Rancher MCM must prohibit or restrict the use of protocols that transmit unencrypted authentication information or use flawed cryptographic algorithms for transmission.

    The container platform and its components will adhere to NIST 800-52R2. To ensure that traffic coming through the ingress controller is re-encrypted internally, switch off port 80 on the service ob...
    Rule High Severity
  • SRG-APP-000318-CTR-000740

    Group
  • Rancher MCM must enforce organization-defined circumstances and/or usage conditions for organization-defined accounts.

    Rancher MCM must verify the certificate used for Rancher's ingress is a valid DOD certificate. This is achieved by verifying the helm installation contains correct parameters.
    Rule Medium Severity
  • SRG-APP-000026-CTR-000070

    Group
  • Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.

    Audit logs must be enabled. Rancher MCM provides audit record generation capabilities. Audit logs capture what happened, when it happened, who initiated it, and what cluster it affected to ensure ...
    Rule Medium Severity
  • SRG-APP-000028-CTR-000080

    Group
  • When allowed by the central authentication system, the default role assigned to a user must be User-Base.

    Rancher MCM uses roles for authentication. It is necessary to ensure the proper roles and permissions are configured. The role used by default does not ensure least privilege. The default role need...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules