Skip to content

Rancher Government Solutions RKE2 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Rancher RKE2 must store only cryptographic representations of passwords.

    <VulnDiscussion>Secrets, such as passwords, keys, tokens, and certificates should not be stored as environment variables. These environment v...
    Rule Medium Severity
  • SRG-APP-000190-CTR-000500

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000014-CTR-000035

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.

    &lt;VulnDiscussion&gt;Use strong TLS settings. RKE2 uses FIPS validated BoringCrypto modules. RKE2 Server can prohibit the use of SSL and unauthor...
    Rule High Severity
  • SRG-APP-000023-CTR-000055

    <GroupDescription></GroupDescription>
    Group
  • RKE2 must use a centralized user management solution to support account management functions.

    &lt;VulnDiscussion&gt;The Kubernetes Controller Manager is a background process that embeds core control loops regulating cluster system state thro...
    Rule Medium Severity
  • SRG-APP-000026-CTR-000070

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Medium Severity
  • SRG-APP-000033-CTR-000090

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes Controller Manager must have secure binding.

    &lt;VulnDiscussion&gt;Limiting the number of attack vectors and implementing authentication and encryption on the endpoints available to external s...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules