Skip to content

Container Platform Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000014

    Group
  • SRG-APP-000014

    Group
  • The container platform must use TLS 1.2 or greater for secure communication.

    The authenticity and integrity of the container platform and communication between nodes and components must be secure. If an insecure protocol is used during transmission of data, the data can be ...
    Rule Medium Severity
  • SRG-APP-000023

    Group
  • SRG-APP-000024

    Group
  • The container platform must automatically remove or disable temporary user accounts after 72 hours.

    If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To mitigate this risk, automated termination of al...
    Rule Medium Severity
  • SRG-APP-000025

    Group
  • SRG-APP-000026

    Group
  • The container platform must automatically audit account creation.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to create a new ...
    Rule Medium Severity
  • SRG-APP-000027

    Group
  • The container platform must automatically audit account modification.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to modify an exi...
    Rule Medium Severity
  • SRG-APP-000028

    Group
  • The container platform must automatically audit account-disabling actions.

    When application accounts are disabled, user accessibility is affected. Once an attacker establishes access to an application, the attacker often attempts to disable authorized accounts to disrupt ...
    Rule Medium Severity
  • SRG-APP-000029

    Group
  • SRG-APP-000033

    Group
  • Least privilege access and need to know must be required to access the container platform registry.

    The container platform registry is used to store images and is the keeper of truth for trusted images within the platform. To guarantee the images integrity, access to the registry must be limited ...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • Least privilege access and need to know must be required to access the container platform runtime.

    The container platform runtime is used to instantiate containers. If this process is accessed by those persons who are not authorized, those containers offering services can be brought to a denial ...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • Least privilege access and need to know must be required to access the container platform keystore.

    The container platform keystore is used to store access keys and tokens for trusted access to and from the container platform. The keystore gives the container platform a method to store the confid...
    Rule Medium Severity
  • SRG-APP-000038

    Group
  • The container platform must enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies.

    Controlling information flow between the container platform components and container user services instantiated by the container platform must enforce organization-defined information flow policies...
    Rule Medium Severity
  • SRG-APP-000039

    Group
  • SRG-APP-000065

    Group
  • The container platform must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the a...
    Rule Medium Severity
  • SRG-APP-000068

    Group
  • SRG-APP-000069

    Group
  • The container platform must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage and conditions and take explicit actions to log on for further access.

    The banner must be acknowledged by the user prior to allowing the user access to any container platform component. This provides assurance that the user has seen the message and accepted the condit...
    Rule Low Severity
  • SRG-APP-000089

    Group
  • The container platform must generate audit records for all DoD-defined auditable events within all components in the platform.

    Within the container platform, audit data can be generated from any of the deployed container platform components. This audit data is important when there are issues, including security incidents t...
    Rule Medium Severity
  • SRG-APP-000090

    Group
  • The container platform must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.

    Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...
    Rule Medium Severity
  • SRG-APP-000091

    Group
  • SRG-APP-000092

    Group
  • The container platform must initiate session auditing upon startup.

    When the container platform is started, container platform components and user services can also be started. It is important that the container platform begin auditing on startup in order to handle...
    Rule Medium Severity
  • SRG-APP-000095

    Group
  • SRG-APP-000096

    Group
  • SRG-APP-000097

    Group
  • All audit records must identify where in the container platform the event occurred.

    Within the container platform, audit data can be generated from any of the deployed container platform components. This audit data is important when there are issues, such as security incidents, th...
    Rule Medium Severity
  • SRG-APP-000098

    Group
  • SRG-APP-000099

    Group
  • All audit records must generate the event results within the container platform.

    Within the container platform, audit data can be generated from any of the deployed container platform components. This audit data is important when there are issues, such as security incidents, th...
    Rule Medium Severity
  • SRG-APP-000100

    Group
  • All audit records must identify any users associated with the event within the container platform.

    Without information that establishes the identity of the user associated with the events, security personnel cannot determine responsibility for the potentially harmful event.
    Rule Medium Severity
  • SRG-APP-000100

    Group
  • SRG-APP-000101

    Group
  • SRG-APP-000111

    Group
  • The container platform components must provide the ability to send audit logs to a central enterprise repository for review and analysis.

    The container platform components must send audit events to a central managed audit log repository to provide reporting, analysis, and alert notification. Incident response relies on successful tim...
    Rule Medium Severity
  • SRG-APP-000116

    Group
  • The container platform must use internal system clocks to generate audit record time stamps.

    Understanding when and sequence of events for an incident is crucial to understand what may have taken place. Without a common clock, the components generating audit events could be out of synchron...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules