Rancher RKE2 STIG V2R4

View as one page
STIG IDTitle
CNTR-R2-000010Rancher RKE2 must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.
CNTR-R2-000030RKE2 must use a centralized user management solution to support account management functions.
CNTR-R2-000060Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
CNTR-R2-000100The Kubernetes Controller Manager must have secure binding.
CNTR-R2-000110The Kubernetes Kubelet must have anonymous authentication disabled.
CNTR-R2-000120The Kubernetes API server must have the insecure port flag disabled.
CNTR-R2-000130The Kubernetes Kubelet must have the read-only port flag disabled.
CNTR-R2-000140The Kubernetes API server must have the insecure bind address not set.
CNTR-R2-000150The Kubernetes kubelet must enable explicit authorization.
CNTR-R2-000160The Kubernetes API server must have anonymous authentication disabled.
CNTR-R2-000320All audit records must identify any containers associated with the event within Rancher RKE2.
CNTR-R2-000520Configuration and authentication files for Rancher RKE2 must be protected.
CNTR-R2-000550Rancher RKE2 must be configured with only essential configurations.
CNTR-R2-000580Rancher RKE2 runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.
CNTR-R2-000800Rancher RKE2 must store only cryptographic representations of passwords.
CNTR-R2-000890Rancher RKE2 must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after five minutes of inactivity.
CNTR-R2-000940Rancher RKE2 runtime must isolate security functions from nonsecurity functions.
CNTR-R2-000970Rancher RKE2 runtime must maintain separate execution domains for each container by assigning each container a separate address space to prevent unauthorized and unintended information transfer via shared system resources.
CNTR-R2-001130Rancher RKE2 must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
CNTR-R2-001270Rancher RKE2 must prohibit the installation of patches, updates, and instantiation of container images without explicit privileged status.
CNTR-R2-001500Rancher RKE2 keystore must implement encryption to prevent unauthorized disclosure of information at rest within Rancher RKE2.
CNTR-R2-001580Rancher RKE2 must remove old components after updated versions have been installed.
CNTR-R2-001620Rancher RKE2 registry must contain the latest images with most recent updates and execute within Rancher RKE2 runtime as authorized by IAVM, CTOs, DTMs, and STIGs.
CNTR-R2-000460Rancher RKE2 must be built from verified packages.