Container Platform Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000319
Group -
SRG-APP-000320
Group -
SRG-APP-000340
Group -
The container platform must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Controlling what users can perform privileged functions prevents unauthorized users from performing tasks that may expose data or degrade the container platform. When users are not segregated into ...Rule Medium Severity -
SRG-APP-000342
Group -
Container images instantiated by the container platform must execute using least privileges.
Containers running within the container platform must execute as non-privileged. When a container can execute as a privileged container, the privileged container is also a privileged user within th...Rule Medium Severity -
SRG-APP-000343
Group -
The container platform must audit the execution of privileged functions.
Privileged functions within the container platform can be component specific or can envelope the entire container platform. Because of the nature of the commands, it is important to understand what...Rule Medium Severity -
SRG-APP-000345
Group -
SRG-APP-000516
Group -
The container platform must provide the configuration for organization-identified individuals or roles to change the auditing to be performed on all components, based on all selectable event criteria within organization-defined time thresholds.
Auditing requirements may change per organization or situation within and organization. With the container platform allowing an organization to customize the auditing, an organization can decide to...Rule Medium Severity -
SRG-APP-000357
Group -
The container platform must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
In order to ensure applications have a sufficient storage capacity in which to write the audit logs, applications need to be able to allocate audit record storage capacity. The task of allocating ...Rule Medium Severity -
SRG-APP-000358
Group -
Audit records must be stored at a secondary location.
Auditable events are used in the investigation of incidents and must be protected from being deleted or altered. Often, events that took place in the past must be viewed to understand the entire in...Rule Medium Severity -
SRG-APP-000359
Group -
The container platform must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
If security personnel are not notified immediately upon storage volume utilization reaching 75 percent, they are unable to plan for storage capacity expansion.Rule Medium Severity -
SRG-APP-000360
Group -
SRG-APP-000374
Group -
All audit records must use UTC or GMT time stamps.
The container platform and its components must generate audit records using either Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) time stamps or local time that offset from UTC. All ...Rule Medium Severity -
SRG-APP-000375
Group -
SRG-APP-000378
Group -
The container platform must prohibit the installation of patches and updates without explicit privileged status.
Controlling access to those users and roles responsible for patching and updating the container platform reduces the risk of untested or potentially malicious software from being installed within t...Rule Medium Severity -
SRG-APP-000378
Group -
The container platform runtime must prohibit the instantiation of container images without explicit privileged status.
Controlling access to those users and roles responsible for container image instantiation reduces the risk of untested or potentially malicious containers from being executed within the platform an...Rule High Severity -
SRG-APP-000378
Group -
SRG-APP-000380
Group -
The container platform must enforce access restrictions for container platform configuration changes.
Configuration changes cause the container platform to change the way it operates. These changes can be used to improve the system with added features or performance, but these configuration changes...Rule Medium Severity -
SRG-APP-000381
Group -
The container platform must enforce access restrictions and support auditing of the enforcement actions.
Auditing the enforcement of access restrictions against changes to the container platform helps identify attacks and provides forensic data for investigation for after-the-fact actions. Attempts to...Rule Medium Severity -
SRG-APP-000383
Group -
All non-essential, unnecessary, and unsecure DoD ports, protocols, and services must be disabled in the container platform.
To properly offer services to the user and to orchestrate containers, the container platform may offer services that use ports and protocols that best fit those services. The container platform, wh...Rule Medium Severity -
SRG-APP-000384
Group -
The container platform must prevent component execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage.
The container platform may offer components such as DNS services, firewall services, router services, or web services that are not required by every organization to meet their needs. Container plat...Rule Medium Severity -
SRG-APP-000386
Group -
SRG-APP-000389
Group -
SRG-APP-000391
Group -
The container platform must be configured to use multi-factor authentication for user authentication.
Controlling access to the container platform and its components is paramount in having a secure and stable system. Validating users is the first step in controlling the access. Users may be validat...Rule Medium Severity -
SRG-APP-000400
Group -
The container platform must prohibit the use of cached authenticators after an organization-defined time period.
If cached authentication information is out of date, the validity of the authentication information may be questionable.Rule Medium Severity -
SRG-APP-000401
Group -
The container platform, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
The potential of allowing access to users who are no longer authorized (have revoked certificates) increases unless a local cache of revocation data is configured.Rule Medium Severity -
SRG-APP-000402
Group -
SRG-APP-000409
Group -
SRG-APP-000411
Group -
Container platform applications and Application Program Interfaces (API) used for nonlocal maintenance sessions must use FIPS-validated keyed-hash message authentication code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified, and therefore cannot be relied on to provide confidentiality or integrity, and DoD data may be c...Rule Medium Severity -
SRG-APP-000412
Group -
SRG-APP-000414
Group -
Vulnerability scanning applications must implement privileged access authorization to all container platform components, containers, and container images for selected organization-defined vulnerability scanning activities.
In certain situations, the nature of the vulnerability scanning may be more intrusive, or the container platform component that is the subject of the scanning may contain highly sensitive informati...Rule Medium Severity -
SRG-APP-000516
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.