Rancher MCM must prohibit or restrict the use of protocols that transmit unencrypted authentication information or use flawed cryptographic algorithms for transmission.
An XCCDF Rule
Description
The container platform and its components will adhere to NIST 800-52R2. To ensure that traffic coming through the ingress controller is re-encrypted internally, switch off port 80 on the service object and direct ingress traffic to port 443 over HTTPS.
- ID
- SV-252849r961911_rule
- Version
- CNTR-RM-001730
- Severity
- High
- References
- Updated
Remediation Templates
A Manual Procedure
Gather the current values of the Rancher deployment by running the following:
helm get values -n cattle-system rancher > /tmp/rancher-values.yaml
Create another values file to upgrade Rancher's ingress object for HTTPS. Add the following to "/tmp/rancher-ingress-values.yaml":