Container Platform Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The container platform must enforce password complexity by requiring that at least one lowercase character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
The container platform must enforce password complexity by requiring that at least one special character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
Passwords need to be protected on entry, in transmission, during authentication, and when stored. If compromised at any of these security points, a nefarious user can use the password along with st...Rule High Severity -
The container platform must map the authenticated identity to the individual user or group account for PKI-based authentication.
The container platform and its components may require authentication before use. When the authentication is PKI-based, the container platform or component must map the certificate to a user account...Rule Medium Severity -
The container platform must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
To prevent the compromise of authentication information such as passwords during the authentication process, the feedback from the container platform and its components, e.g., runtime, registry, an...Rule Medium Severity -
The container platform must employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions.
If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the system. The act of managing systems and applications includes the ability to...Rule Medium Severity -
The container platform must separate user functionality (including user interface services) from information system management functionality.
Separating user functionality from management functionality is a requirement for all the components within the container platform. Without the separation, users may have access to management functi...Rule Medium Severity -
The container platform runtime must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
The container platform offers services for container image orchestration and services for users. If any of these services were to fail into an insecure state, security measures for user and data se...Rule Medium Severity -
The container platform must never automatically remove or disable emergency accounts.
Emergency accounts are administrator accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation ...Rule Medium Severity -
The container platform must prohibit containers from accessing privileged resources.
Containers images instantiated within the container platform may request access to host system resources. Access to privileged resources can allow for unauthorized and unintended transfer of inform...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.