Mirantis Kubernetes Engine Security Technical Implementation Guide

Overview

VersionDateFinding Count (44)Downloads
22024-08-27CAT I (High): 3CAT II (Medium): 40CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - All

Finding IDSeverityTitleDescription
V-260906
LOWMEDIUMHIGH
Least privilege access and need to know must be required to access MKE runtime and instantiate container images.To control what is instantiated within MKE, it is important to control access to the runtime. Without this control, container platform specific servic...
V-260907
LOWMEDIUMHIGH
Only required ports must be open on containers in MKE.Ports, protocols, and services within MKE runtime must be controlled and conform to the PPSM CAL. Those ports, protocols, and services that fall outsi...
V-260908
LOWMEDIUMHIGH
FIPS mode must be enabled.During any user authentication, MKE must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process. ...
V-260903
LOWMEDIUMHIGH
The Lifetime Minutes and Renewal Threshold Minutes Login Session Controls on MKE must be set.The "Lifetime Minutes" and "Renewal Threshold Minutes" login session controls in MKE are part of security features that help manage user sessions with...
V-260904
LOWMEDIUMHIGH
In an MSR organization, user permissions and repositories must be configured.Configuring user permissions, organizations, and repositories in MSR is crucial for maintaining a secure, organized, and efficient container image man...
V-260905
LOWMEDIUMHIGH
User-managed resources must be created in dedicated namespaces.Dedicated namespaces act as security boundaries, limiting the blast radius in case of security incidents or misconfigurations. If an issue arises with...
V-260909
LOWMEDIUMHIGH
MKE must be configured to integrate with an Enterprise Identity Provider.Configuring MKE to integrate with an Enterprise Identity Provider enhances security, simplifies user management, ensures compliance, provides auditing...
V-260910
LOWMEDIUMHIGH
SSH must not run within Linux containers.To limit the attack surface of MKE, it is important that the nonessential services are not installed. Containers are designed to be lightweight and is...
V-260911
LOWMEDIUMHIGH
Swarm Secrets or Kubernetes Secrets must be used.Swarm Secrets in Docker Swarm and Kubernetes Secrets both provide mechanisms for encrypting sensitive data at rest. This adds an additional layer of s...
V-260912
LOWMEDIUMHIGH
MKE must have Grants created to control authorization to cluster resources.MKE uses Role-Based Access Controls (RBAC) to enforce approved authorizations for logical access to information and system resources in accordance wit...
V-260913
LOWMEDIUMHIGH
MKE host network namespace must not be shared.MKE can be built with privileges that are not approved within the organization. To limit the attack surface of MKE, it is essential that privileges me...
V-260914
LOWMEDIUMHIGH
Audit logging must be enabled on MKE.Enabling audit logging on MKE enhances security, supports compliance efforts, provides user accountability, and offers valuable insights for incident ...
V-260915
LOWMEDIUMHIGH
MKE must be configured to send audit data to a centralized log server.Sending audit data from MKE to a centralized log server enhances centralized monitoring, facilitates efficient incident response, scales effectively, ...
V-260916
LOWMEDIUMHIGH
MSR's self-signed certificates must be replaced with DOD trusted, signed certificates.Self-signed certificates pose security risks, as they are not issued by a trusted third party. DOD trusted, signed certificates have undergone a valid...
V-260917
LOWMEDIUMHIGH
Allowing users and administrators to schedule containers on all nodes must be disabled.MKE and MSR are set to disallow administrators and users to schedule containers. This setting must be checked for allowing administrators or users to ...
V-260918
LOWMEDIUMHIGH
MKE telemetry must be disabled.MKE provides a telemetry service that automatically records and transmits data to Mirantis through an encrypted channel for monitoring and analysis pu...
V-260919
LOWMEDIUMHIGH
MSR telemetry must be disabled.MSR provides a telemetry service that automatically records and transmits data to Mirantis through an encrypted channel for monitoring and analysis pu...
V-260920
LOWMEDIUMHIGH
For MKE's deployed on an Ubuntu host operating system, the AppArmor profile must be enabled.AppArmor protects the Ubuntu OS and applications from various threats by enforcing security policy which is also known as AppArmor profile. The user c...
V-260921
LOWMEDIUMHIGH
If MKE is deployed on a Red Hat or CentOS system, SELinux security must be enabled.SELinux provides a Mandatory Access Control (MAC) system on RHEL and CentOS that greatly augments the default Discretionary Access Control (DAC) model...
V-260922
LOWMEDIUMHIGH
The Docker socket must not be mounted inside any containers.The Docker socket docker.sock must not be mounted inside a container, with the exception case being during the installation of Universal Control Plane...
V-260923
LOWMEDIUMHIGH
Linux Kernel capabilities must be restricted within containers.By default, MKE starts containers with a restricted set of Linux Kernel Capabilities. Any process may be granted the required capabilities instead of ...
V-260924
LOWMEDIUMHIGH
Incoming container traffic must be bound to a specific host interface.Privileged ports are those ports below 1024 and that require system privileges for their use. If containers are able to use these ports, the container...
V-260925
LOWMEDIUMHIGH
CPU priority must be set appropriately on all containers.All containers on a Docker host share the resources equally. By using the resource management capabilities of Docker host, such as CPU shares, the use...
V-260926
LOWMEDIUMHIGH
MKE must use a non-AUFS storage driver.The aufs storage driver is an old driver based on a Linux kernel patch-set that is unlikely to be merged into the main Linux kernel. aufs driver is al...
V-260927
LOWMEDIUMHIGH
MKE's self-signed certificates must be replaced with DOD trusted, signed certificates.Self-signed certificates pose security risks, as they are not issued by a trusted third party. DOD trusted, signed certificates have undergone a valid...
V-260928
LOWMEDIUMHIGH
The "Create repository on push" option in MSR must be disabled.Allowing repositories to be created on a push can override essential settings and must not be allowed....
V-260929
LOWMEDIUMHIGH
Containers must not map to privileged ports.Privileged ports are those ports below 1024 and that require system privileges for their use. If containers are able to use these ports, the container...
V-260930
LOWMEDIUMHIGH
MKE must not permit users to create pods that share host process namespace.Controlling information flow between MKE components and container user services instantiated by MKE must enforce organization-defined information flow...
V-260931
LOWMEDIUMHIGH
IPSec network encryption must be configured.IPsec encrypts the data traffic between nodes in a Kubernetes cluster, ensuring that the information exchanged is confidential and protected from unau...
V-260932
LOWMEDIUMHIGH
MKE must preserve any information necessary to determine the cause of the disruption or failure.When a failure occurs within MKE, preserving the state of MKE and its components, along with other container services, helps to facilitate container p...
V-260933
LOWMEDIUMHIGH
MKE must enable kernel protection.System kernel is responsible for memory, disk, and task management. The kernel provides a gateway between the system hardware and software. Kubernetes...
V-260934
LOWMEDIUMHIGH
All containers must be restricted from acquiring additional privileges.To limit the attack surface of MKE, it is important that the nonessential services are not installed and access to the host system uses the concept of...
V-260935
LOWMEDIUMHIGH
Host IPC namespace must not be shared.IPC (POSIX/SysV IPC) namespace provides separation of named shared memory segments, semaphores, and message queues. IPC namespace on the host must not...
V-260936
LOWMEDIUMHIGH
All containers must be restricted to mounting the root filesystem as read only.The container's root filesystem must be treated as a "golden image" by using Docker run's --read-only option. This prevents any writes to the containe...
V-260937
LOWMEDIUMHIGH
The default seccomp profile must not be disabled.Seccomp filtering provides a means for a process to specify a filter for incoming system calls. The default seccomp profile works on a whitelist basis...
V-260938
LOWMEDIUMHIGH
Docker CLI commands must be run with an MKE client trust bundle and without unnecessary permissions.Running docker CLI commands remotely with a client trust bundle ensures that authentication and role permissions are checked for the command. Using -...
V-260939
LOWMEDIUMHIGH
MKE users must not have permissions to create containers or pods that share the host user namespace.To limit the attack surface of MKE, it is important that the nonessential services are not installed and access to the host system uses the concept of...
V-260940
LOWMEDIUMHIGH
Use of privileged Linux containers must be limited to system containers.Using the --privileged flag gives all Linux Kernel Capabilities to the container, thus overwriting the --cap-add and --cap-drop flags. The --privilege...
V-260941
LOWMEDIUMHIGH
The network ports on all running containers must be limited to required ports.To validate that the services are using only the approved ports and protocols, the organization must perform a periodic scan/review of MKE and disable...
V-260942
LOWMEDIUMHIGH
MKE must only run signed images.Controlling the sources where container images can be pulled from allows the organization to define what software can be run within MKE. Allowing any ...
V-260943
LOWMEDIUMHIGH
Vulnerability scanning must be enabled for all repositories in MSR.Enabling vulnerability scanning for all repositories in Mirantis Secure Registry (MSR) is a critical security practice that helps organizations identi...
V-260944
LOWMEDIUMHIGH
Older Universal Control Plane (MKE) and Docker Trusted Registry (DTR) images must be removed from all cluster nodes upon upgrading.When upgrading either the UCP or DTR components of MKE, the newer images are pulled (or unpacked if offline) onto engine nodes in a cluster. Once the ...
V-260945
LOWMEDIUMHIGH
MKE must contain the latest updates.MKE must stay up to date with the latest patches, service packs, and hot fixes. Not updating MKE will expose the organization to vulnerabilities....
V-260946
LOWMEDIUMHIGH
MKE must display the Standard Mandatory DOD Notice and Consent Banner before granting access to platform components.MKE has countless components where different access levels are needed. To control access, the user must first log in to MKE and then be presented with...