Check: CNTR-R2-001500
Rancher Government Solutions RKE2 STIG:
CNTR-R2-001500
(in versions v2 r1 through v1 r1)
Title
Rancher RKE2 keystore must implement encryption to prevent unauthorized disclosure of information at rest within Rancher RKE2. (Cat I impact)
Discussion
Encrypting secrets at rest in etcd. By default, RKE2 will create an encryption key and configuration file and pass these to the Kubernetes API server. The result is that RKE2 automatically encrypts Kubernetes Secret objects when writing them to etcd.
Check Content
Review the encryption configuration file. As root or with root permissions, run the following command: view /var/lib/rancher/rke2/server/cred/encryption-config.json Ensure the RKE2 configuration file on all RKE2 servers, located at /etc/rancher/rke2/config.yaml, does NOT contain: secrets-encryption: false If secrets encryption is turned off, this is a finding.
Fix Text
Enable secrets encryption. Edit the RKE2 configuration file on all RKE2 servers, located at /etc/rancher/rke2/config.yaml, so that it contains: secrets-encryption: true
Additional Identifiers
Rule ID: SV-254573r961602_rule
Vulnerability ID: V-254573
Group Title: SRG-APP-000429-CTR-001060
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002476 |
Implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined system components. |
Controls
Number | Title |
---|---|
SC-28(1) |
Cryptographic Protection |