CNTR-R2-000580 Rancher RKE2 runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.

Information

Ports, protocols, and services within the RKE2 runtime must be controlled and conform to the PPSM CAL. Those ports, protocols, and services that fall outside the PPSM CAL must be blocked by the runtime. Instructions on the PPSM can be found in DOD Instruction 8551.01 Policy.

RKE2 sets most ports and services configuration upon initiation; however, these ports can be changed after the fact to noncompliant configurations. It is important to verify core component configurations for compliance.

API Server, Scheduler, Controller, ETCD, and User Pods should all be checked to ensure proper PPS configuration.

Satisfies: SRG-APP-000142-CTR-000325, SRG-APP-000142-CTR-000330, SRG-APP-000383-CTR-000910

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Review the documentation covering how to set these PPSs and update this configuration file:

/etc/rancher/rke2/config.yaml

Once configuration file is updated, restart the RKE2 Server. Run the command:
systemctl restart rke2-server

See Also

https://workbench.cisecurity.org/benchmarks/0

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(1)(b), 800-53|CM-7b., CAT|II, CCI|CCI-000382, CCI|CCI-001762, Rule-ID|SV-254566r960966_rule, STIG-ID|CNTR-R2-000580, Vuln-ID|V-254566

Plugin: Unix

Control ID: 85189701d824ad892a98066850bd52ea3ce99b2cac8f76d30926f962677a3251