Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000190-CTR-000500

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after five minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-APP-000233-CTR-000585

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 runtime must isolate security functions from nonsecurity functions.

    &lt;VulnDiscussion&gt;RKE2 runs as isolated as possible. RKE2 is a container-based Kubernetes distribution. A container image is essentially a com...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 runtime must maintain separate execution domains for each container by assigning each container a separate address space to prevent unauthorized and unintended information transfer via shared system resources.

    &lt;VulnDiscussion&gt;Separating user functionality from management functionality is a requirement for all the components within the Kubernetes Con...
    Rule Medium Severity
  • SRG-APP-000340-CTR-000770

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Admission controllers intercept requests to the Kubernetes API before an object is instantiated. Enabling the admissions webh...
    Rule Medium Severity
  • SRG-APP-000378-CTR-000880

    <GroupDescription></GroupDescription>
    Group
  • Rancher RKE2 must prohibit the installation of patches, updates, and instantiation of container images without explicit privileged status.

    &lt;VulnDiscussion&gt;Controlling access to those users and roles responsible for patching and updating RKE2 reduces the risk of untested or potent...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules