UCF STIG Viewer Logo

Rancher RKE2 must store only cryptographic representations of passwords.


Overview

Finding ID Version Rule ID IA Controls Severity
V-254567 CNTR-R2-000800 SV-254567r859271_rule Medium
Description
Secrets, such as passwords, keys, tokens, and certificates should not be stored as environment variables. These environment variables are accessible inside RKE2 by the "Get Pod" API call, and by any system, such as CI/CD pipeline, which has access to the definition file of the container. Secrets must be mounted from files or stored within password vaults.
STIG Date
Rancher Government Solutions RKE2 Security Technical Implementation Guide 2022-10-13

Details

Check Text ( C-58051r859269_chk )
On the RKE2 Control Plane, run the following command:

kubectl get all -o jsonpath='{range .items[?(@..secretKeyRef)]} {.kind} {.metadata.name} {"\n"}{end}' -A

If any of the values returned reference environment variables, this is a finding.
Fix Text (F-58000r859270_fix)
Any secrets stored as environment variables must be moved to the secret files with the proper protections and enforcements or placed within a password vault.