Skip to content

Container Platform Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The container platform must enforce a minimum 15-character password length.

    The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...
    Rule Medium Severity
  • SRG-APP-000166

    Group
  • The container platform must enforce password complexity by requiring that at least one uppercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000167

    Group
  • SRG-APP-000168

    Group
  • The container platform must enforce password complexity by requiring that at least one numeric character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000169

    Group
  • SRG-APP-000170

    Group
  • The container platform must require the change of at least 15 of the total number of characters when passwords are changed.

    If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at ...
    Rule Medium Severity
  • SRG-APP-000171

    Group
  • For container platform using password authentication, the application must store only cryptographic representations of passwords.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read and easily compromised. Use of ...
    Rule Medium Severity
  • SRG-APP-000172

    Group
  • SRG-APP-000173

    Group
  • The container platform must enforce 24 hours (one day) as the minimum password lifetime.

    Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. Restricting this setting limits the user's ability to...
    Rule Medium Severity
  • SRG-APP-000174

    Group
  • The container platform must enforce a 60-day maximum password lifetime restriction.

    Any password, no matter how complex, can eventually be cracked; therefore, passwords need to be changed at specific intervals. One method of minimizing this risk is to use complex passwords and p...
    Rule Medium Severity
  • SRG-APP-000177

    Group
  • SRG-APP-000178

    Group
  • SRG-APP-000181

    Group
  • The container platform must provide an audit reduction capability that supports on-demand reporting requirements.

    The ability to generate on-demand reports, including after the audit data has been subjected to audit reduction, greatly facilitates the organization's ability to generate incident reports as neede...
    Rule Medium Severity
  • SRG-APP-000185

    Group
  • SRG-APP-000190

    Group
  • The application must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity
  • SRG-APP-000211

    Group
  • SRG-APP-000219

    Group
  • The container platform must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.

    The container platform is responsible for pulling images from trusted sources and placing those images into its registry. To protect the transmission of images, the container platform must use FIPS...
    Rule High Severity
  • SRG-APP-000225

    Group
  • SRG-APP-000226

    Group
  • The container platform must preserve any information necessary to determine the cause of the disruption or failure.

    When a failure occurs within the container platform, preserving the state of the container platform and its components, along with other container services, helps to facilitate container platform r...
    Rule Medium Severity
  • SRG-APP-000233

    Group
  • The container platform runtime must isolate security functions from non-security functions.

    The container platform runtime must be configured to isolate those services used for security functions from those used for non-security functions. This separation can be performed using environmen...
    Rule Medium Severity
  • SRG-APP-000234

    Group
  • SRG-APP-000243

    Group
  • SRG-APP-000243

    Group
  • The container platform must prevent unauthorized and unintended information transfer via shared system resources.

    The container platform makes host system resources available to container services. These shared resources, such as the host system kernel, network connections, and storage, must be protected to pr...
    Rule Medium Severity
  • SRG-APP-000246

    Group
  • SRG-APP-000266

    Group
  • The container platform must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    The container platform is responsible for offering services to users. These services could be across diverse user groups and data types. To protect information about the container platform, service...
    Rule Medium Severity
  • SRG-APP-000290

    Group
  • SRG-APP-000291

    Group
  • The container platform must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are created.

    Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply ...
    Rule Medium Severity
  • SRG-APP-000292

    Group
  • SRG-APP-000293

    Group
  • The container platform must notify system administrators and ISSO for account disabling actions.

    When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes themselves. Sending notif...
    Rule Medium Severity
  • SRG-APP-000294

    Group
  • The container platform must notify system administrators and ISSO for account removal actions.

    When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for identifying the application processes themselves. Sending notification of a...
    Rule Medium Severity
  • SRG-APP-000297

    Group
  • Access to the container platform must display an explicit logout message to user indicating the reliable termination of authenticated communication sessions.

    Access to the container platform will occur through web and terminal sessions. Any web interfaces must conform to application and web security requirements. Terminal access to the container platfor...
    Rule Low Severity
  • SRG-APP-000317

    Group
  • The container platform must terminate shared/group account credentials when members leave the group.

    If shared/group account credentials are not terminated when individuals leave the group, the user that left the group can still gain access even though they are no longer authorized. A shared/group...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules