STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation Guide

V-257292

CAT II (Medium)

Rancher MCM must enforce organization-defined circumstances and/or usage conditions for organization-defined accounts.

Rule ID

SV-257292r961287_rule

STIG

Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-002145

Discussion

Rancher MCM must verify the certificate used for Rancher's ingress is a valid DOD certificate. This is achieved by verifying the helm installation contains correct parameters.

Check Content

Verify helm installation contains correct parameters:
Navigate to Triple Bar Symbol(Global) >>  <local cluster>.
From the kubectl shell (>_) Execute:
`helm get values rancher -n cattle-system`

The output must contain:
```
privateCA: true
ingress:
tls:
source: secret
```
If the output source is not "secret", this is a finding.

Verify contents of certificates are correct: 
From the console, type:
kubectl -n cattle-system get secret tls-rancher-ingress -o 'jsonpath={.data.tls\.crt}' | base64 --decode | openssl x509 -noout -text

kubectl -n cattle-system get secret tls-ca -o 'jsonpath={.data.cacerts\.pem}' | base64 --decode | openssl x509 -noout -text

Fix Text

Update the secrets to contain valid certificates.

Put the correct and valid DOD certificate and key in files called "tls.crt" and "tls.key", respectively, and then run:
kubectl -n cattle-system create secret tls tls-rancher-ingress \  --cert=tls.crt \   --key=tls.key                         

Upload the CA required for the certs by creating another file called "cacerts.pem" and running: 
kubectl -n cattle-system create secret generic tls-ca \   --from-file=cacerts.pem=./cacerts.pem 

The helm chart values need to be updated to include the check section: 
privateCA: true   
ingress:            
tls:                                                                        
source: secret   

Rerun helm upgrade with the new values for the certs to take effect.