Skip to content

Container Platform Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The container platform must restrict individuals' ability to launch organizationally defined denial-of-service (DoS) attacks against other information systems.

    The container platform will offer services to users and these services share resources available on the hosting system. To share the resources in a manner that does not exhaust or over utilize reso...
    Rule Medium Severity
  • The container platform must use cryptographic mechanisms to protect the integrity of audit tools.

    Protecting the integrity of the tools used for auditing purposes is a critical step to ensuring the integrity of audit data. Audit data includes all information (e.g., audit records, audit settings...
    Rule Medium Severity
  • The container platform must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are modified.

    When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes themselves. Sending notif...
    Rule Medium Severity
  • The container platform must automatically audit account-enabling actions.

    Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply ...
    Rule Medium Severity
  • The container platform must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.

    Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply ...
    Rule Medium Severity
  • The container platform must automatically lock an account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the a...
    Rule Medium Severity
  • The container platform must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impe...
    Rule Medium Severity
  • The container platform must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.

    To properly investigate an event, it is important to have enough granularity within the time stamps to determine the chronological order of the audited events. Without this granularity, events may ...
    Rule Medium Severity
  • The container platform registry must prohibit installation or modification of container images without explicit privileged status.

    Controlling access to those users and roles that perform container platform registry functions reduces the risk of untested or potentially malicious containers from being introduced into the platfo...
    Rule Medium Severity
  • The container platform registry must employ a deny-all, permit-by-exception (whitelist) policy to allow only authorized container images in the container platform.

    Controlling the sources where container images can be pulled from allows the organization to define what software can be run within the container platform. Allowing any container image to be introd...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules