Skip to content

Rancher Government Solutions RKE2 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Rancher RKE2 must store only cryptographic representations of passwords.

    <VulnDiscussion>Secrets, such as passwords, keys, tokens, and certificates should not be stored as environment variables. These environment v...
    Rule Medium Severity
  • SRG-APP-000190-CTR-000500

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000014-CTR-000035

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.

    &lt;VulnDiscussion&gt;Use strong TLS settings. RKE2 uses FIPS validated BoringCrypto modules. RKE2 Server can prohibit the use of SSL and unauthor...
    Rule High Severity
  • SRG-APP-000023-CTR-000055

    <GroupDescription></GroupDescription>
    Group
  • RKE2 must use a centralized user management solution to support account management functions.

    &lt;VulnDiscussion&gt;The Kubernetes Controller Manager is a background process that embeds core control loops regulating cluster system state thro...
    Rule Medium Severity
  • SRG-APP-000026-CTR-000070

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Medium Severity
  • SRG-APP-000033-CTR-000090

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes Controller Manager must have secure binding.

    &lt;VulnDiscussion&gt;Limiting the number of attack vectors and implementing authentication and encryption on the endpoints available to external s...
    Rule Medium Severity
  • SRG-APP-000033-CTR-000090

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes Kubelet must have anonymous authentication disabled.

    &lt;VulnDiscussion&gt;RKE2 registry is used to store images and is the keeper of truth for trusted images within the platform. To guarantee the ima...
    Rule Medium Severity
  • SRG-APP-000033-CTR-000095

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes API server must have the insecure port flag disabled.

    &lt;VulnDiscussion&gt;By default, the API server will listen on two ports. One port is the secure port and the other port is called the "localhost ...
    Rule High Severity
  • SRG-APP-000033-CTR-000095

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes Kubelet must have the read-only port flag disabled.

    &lt;VulnDiscussion&gt;Kubelet serves a small REST API with read access to port 10255. The read-only port for Kubernetes provides no authentication ...
    Rule High Severity
  • SRG-APP-000033-CTR-000095

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes API server must have the insecure bind address not set.

    &lt;VulnDiscussion&gt;By default, the API server will listen on two ports and addresses. One address is the secure address and the other address is...
    Rule High Severity
  • SRG-APP-000033-CTR-000095

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes kubelet must enable explicit authorization.

    &lt;VulnDiscussion&gt;Kubelet is the primary agent on each node. The API server communicates with each kubelet to perform tasks such as starting/st...
    Rule High Severity
  • SRG-APP-000033-CTR-000100

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes API server must have anonymous authentication disabled.

    &lt;VulnDiscussion&gt;The Kubernetes API Server controls Kubernetes via an API interface. A user who has access to the API essentially has root acc...
    Rule High Severity
  • SRG-APP-000100-CTR-000200

    <GroupDescription></GroupDescription>
    Group
  • All audit records must identify any containers associated with the event within Rancher RKE2.

    &lt;VulnDiscussion&gt;Ensure that the --audit-log-maxage argument is set to 30 or as appropriate. Retaining logs for at least 30 days ensures that...
    Rule Medium Severity
  • SRG-APP-000133-CTR-000300

    <GroupDescription></GroupDescription>
    Group
  • Configuration and authentication files for Rancher RKE2 must be protected.

    &lt;VulnDiscussion&gt;There are various configuration files, logs, access credentials, and other files stored on the host filesystem that contain s...
    Rule Medium Severity
  • SRG-APP-000141-CTR-000315

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must be configured with only essential configurations.

    &lt;VulnDiscussion&gt;It is important to disable any unnecessary components to reduce any potential attack surfaces. RKE2 allows disabling the fo...
    Rule Medium Severity
  • SRG-APP-000142-CTR-000325

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.

    &lt;VulnDiscussion&gt;Ports, protocols, and services within the RKE2 runtime must be controlled and conform to the PPSM CAL. Those ports, protocols...
    Rule Medium Severity
  • SRG-APP-000171-CTR-000435

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after five minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-APP-000233-CTR-000585

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 runtime must isolate security functions from nonsecurity functions.

    &lt;VulnDiscussion&gt;RKE2 runs as isolated as possible. RKE2 is a container-based Kubernetes distribution. A container image is essentially a com...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 runtime must maintain separate execution domains for each container by assigning each container a separate address space to prevent unauthorized and unintended information transfer via shared system resources.

    &lt;VulnDiscussion&gt;Separating user functionality from management functionality is a requirement for all the components within the Kubernetes Con...
    Rule Medium Severity
  • SRG-APP-000340-CTR-000770

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Admission controllers intercept requests to the Kubernetes API before an object is instantiated. Enabling the admissions webh...
    Rule Medium Severity
  • SRG-APP-000378-CTR-000880

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must prohibit the installation of patches, updates, and instantiation of container images without explicit privileged status.

    &lt;VulnDiscussion&gt;Controlling access to those users and roles responsible for patching and updating RKE2 reduces the risk of untested or potent...
    Rule Medium Severity
  • SRG-APP-000429-CTR-001060

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 keystore must implement encryption to prevent unauthorized disclosure of information at rest within Rancher RKE2.

    &lt;VulnDiscussion&gt;Encrypting secrets at rest in etcd. By default, RKE2 will create an encryption key and configuration file and pass these to ...
    Rule High Severity
  • SRG-APP-000454-CTR-001110

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must remove old components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of Rancher RKE2 components that are not removed after updates have been installed may be exploited by adver...
    Rule Medium Severity
  • SRG-APP-000456-CTR-001125

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 registry must contain the latest images with most recent updates and execute within Rancher RKE2 runtime as authorized by IAVM, CTOs, DTMs, and STIGs.

    &lt;VulnDiscussion&gt;Software supporting RKE2, images in the registry must stay up to date with the latest patches, service packs, and hot fixes. ...
    Rule Medium Severity
  • SRG-APP-000131-CTR-000285

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must be built from verified packages.

    &lt;VulnDiscussion&gt;Only RKE2 images that have been properly signed by Rancher Government's authorized key will be deployed to ensure the cluster...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules