I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000014-CTR-000035
Group -
Rancher RKE2 must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.
Use strong TLS settings. RKE2 uses FIPS validated BoringCrypto modules. RKE2 Server can prohibit the use of SSL and unauthorized versions of TLS protocols to properly secure communication. There i...Rule High Severity -
SRG-APP-000023-CTR-000055
Group -
RKE2 must use a centralized user management solution to support account management functions.
The Kubernetes Controller Manager is a background process that embeds core control loops regulating cluster system state through the API Server. Every process executed in a pod has an associated se...Rule Medium Severity -
SRG-APP-000026-CTR-000070
Group -
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to modify an exi...Rule Medium Severity -
SRG-APP-000033-CTR-000090
Group -
The Kubernetes Controller Manager must have secure binding.
Limiting the number of attack vectors and implementing authentication and encryption on the endpoints available to external sources is paramount when securing the overall Kubernetes cluster. The Co...Rule Medium Severity -
SRG-APP-000033-CTR-000090
Group -
The Kubernetes Kubelet must have anonymous authentication disabled.
RKE2 registry is used to store images and is the keeper of truth for trusted images within the platform. To guarantee the images' integrity, access to the registry must be limited to those individu...Rule Medium Severity -
SRG-APP-000033-CTR-000095
Group -
The Kubernetes API server must have the insecure port flag disabled.
By default, the API server will listen on two ports. One port is the secure port and the other port is called the "localhost port". This port is also called the "insecure port", port 8080. Any requ...Rule High Severity -
SRG-APP-000033-CTR-000095
Group -
The Kubernetes Kubelet must have the read-only port flag disabled.
Kubelet serves a small REST API with read access to port 10255. The read-only port for Kubernetes provides no authentication or authorization security control. Providing unrestricted access on port...Rule High Severity -
SRG-APP-000033-CTR-000095
Group -
The Kubernetes API server must have the insecure bind address not set.
By default, the API server will listen on two ports and addresses. One address is the secure address and the other address is called the "insecure bind" address and is set by default to localhost. ...Rule High Severity -
SRG-APP-000033-CTR-000095
Group -
The Kubernetes kubelet must enable explicit authorization.
Kubelet is the primary agent on each node. The API server communicates with each kubelet to perform tasks such as starting/stopping pods. By default, kubelets allow all authenticated requests, even...Rule High Severity -
SRG-APP-000033-CTR-000100
Group -
The Kubernetes API server must have anonymous authentication disabled.
The Kubernetes API Server controls Kubernetes via an API interface. A user who has access to the API essentially has root access to the entire Kubernetes cluster. To control access, users must be a...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.