Skip to main content
Version: Latest

Rancher Security Best Practices

Restrict Public Access to /version and /rancherversion Path

The upstream (local) Rancher instance provides information about the Rancher version it is running and the Go version that was used to build it. That information is accessible via the /version path, which is used for tasks such as automating version bumps, or confirming that a deployment was successful. The upstream instance also provides Rancher version information accessible via the /rancherversion path.

Adversaries can misuse this information to identify the running Rancher version and cross-relate it with potential bugs to exploit. If your upstream Rancher instance is publicly available on the web, use a Layer 7 firewall to block /version and /rancherversion.

See OWASP Web Application Security Testing - Enumerate Infrastructure and Application Admin Interfaces for more information on protecting your server.

Session Management

Some environments may require additional security controls for session management. For example, you may want to limit users' concurrent active sessions or restrict which geolocations those sessions can be initiated from. Such features are not supported by Rancher out of the box.

If you require such features, combine Layer 7 firewalls with external authentication providers.

Use External Load Balancers to Protect Vulnerable Ports

You should protect the following ports behind an external load balancer that has SSL offload enabled:

  • K3s: Port 6443, used by the Kubernetes API.
  • RKE2: Port 6443, used by the Kubernetes API, and port 9345, used for node registration.

These ports have TLS SAN certificates which list nodes' public IP addresses. An attacker could use that information to gain unauthorized access or monitor activity on the cluster. Protecting these ports helps mitigate against nodes' public IP addresses being disclosed to potential attackers.

Rancher Username Policy

By default, Kubernetes does not provide enforcement mechanisms for baseline username policies. In Rancher, this means that any enforcement of username formats, naming conventions, or baseline policies is expected to be handled by the external identity provider's policies, if such policies are in place.

In Rancher, admin is the default username for the Administrator user, as highlighted here

Examples of potential baseline policies include:

  • Requiring usernames to follow an organizational convention (e.g., firstname.lastname)
  • Enforcing minimum or maximum length requirements
  • Disallowing certain special characters
  • Preventing impersonation by disallowing reserved names (e.g., admin, root)

Without these controls at the identity provider layer, there is a risk of inconsistent or insecure username practices, which can complicate access audits and lead to privilege escalation attempts.

Important

Rancher currently enforces only a minimum password length.

Recommendation: We strongly advice that customers:

  • Review and configure username baseline policies directly in their external identity providers (e.g., LDAP, Active Directory, SAML, or OIDC).
  • Ensure that those policies align with the organization’s security and compliance requirements.
  • Regularly audit user accounts to detect naming inconsistencies or policy violations.

For more information, see:

WAF Rules

Rancher is designed to support a wide range of deployment scenarios, including environments where customers may programmatically automate the creation or provisioning of large numbers of clusters. Imposing strict application-level limits within Rancher itself could interfere with legitimate workloads that require dynamic scaling.

For example:

  • CI/CD pipelines may create and tear down clusters frequently.
  • Self-service portals could provision clusters on-demand for developers.
  • Test environments may generate high volumes of API calls.

Risk: Without appropriate rate limiting, adversaries could exploit unauthenticated or authenticated endpoints to:

  • Exhaust resources (Denial of Service).
  • Inflate storage costs.
  • Degrade performance for legitimate users.

Recommendation: The most effective way to mitigate this risk is to implement rate limiting and abuse protection at the infrastructure or Web Application Firewall (WAF) layer. This approach allows thresholds to be tuned for each environment's expected usage and scaling characteristics. Some examples of controls can be:

  • Configuring a Web Application Firewall or API Gateway to enforce rate limits on sensitive operations, such as cluster creation and provisioning.
  • Defining thresholds based on baseline workload expectations (e.g., max requests per minute per client).
  • Monitoring logs and alerting on anomalies to detect potential abuse.
  • Apply a resource quota, which is a Rancher feature that limits the resources available to a project or namespace.

For more information, see: