Container Platform Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000185
Group -
SRG-APP-000190
Group -
The application must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.
Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...Rule Medium Severity -
SRG-APP-000211
Group -
SRG-APP-000219
Group -
The container platform must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.
The container platform is responsible for pulling images from trusted sources and placing those images into its registry. To protect the transmission of images, the container platform must use FIPS...Rule High Severity -
SRG-APP-000225
Group -
SRG-APP-000226
Group -
The container platform must preserve any information necessary to determine the cause of the disruption or failure.
When a failure occurs within the container platform, preserving the state of the container platform and its components, along with other container services, helps to facilitate container platform r...Rule Medium Severity -
SRG-APP-000233
Group -
The container platform runtime must isolate security functions from non-security functions.
The container platform runtime must be configured to isolate those services used for security functions from those used for non-security functions. This separation can be performed using environmen...Rule Medium Severity -
SRG-APP-000234
Group -
SRG-APP-000243
Group -
SRG-APP-000243
Group -
The container platform must prevent unauthorized and unintended information transfer via shared system resources.
The container platform makes host system resources available to container services. These shared resources, such as the host system kernel, network connections, and storage, must be protected to pr...Rule Medium Severity -
SRG-APP-000246
Group -
SRG-APP-000266
Group -
The container platform must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
The container platform is responsible for offering services to users. These services could be across diverse user groups and data types. To protect information about the container platform, service...Rule Medium Severity -
SRG-APP-000290
Group -
SRG-APP-000291
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.