CNTR-R2-001500 Rancher RKE2 keystore must implement encryption to prevent unauthorized disclosure of information at rest within Rancher RKE2.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Encrypting secrets at rest in etcd.

By default, RKE2 will create an encryption key and configuration file and pass these to the Kubernetes API server. The result is that RKE2 automatically encrypts Kubernetes Secret objects when writing them to etcd.

Solution

This is Not Applicable for RKE2 versions 1.20 and greater.

Enable secrets encryption.

Edit the RKE2 configuration file on all RKE2 servers, located at /etc/rancher/rke2/config.yaml, so that it contains:

secrets-encryption: true

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RGS_RKE2_V2R2_STIG.zip

Item Details

References: CAT|I, CCI|CCI-002476, Rule-ID|SV-254573r1016545_rule, STIG-ID|CNTR-R2-001500, Vuln-ID|V-254573

Plugin: Unix

Control ID: d0c57d8649e6e2e9ed53b7d5dbc7c42e78e4d0fbbc0606f9dc9e2d589bb57c26