Red Hat OpenShift Container Platform 4.12 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000126-CTR-000275
Group -
OpenShift must use FIPS-validated cryptographic mechanisms to protect the integrity of log information.
To fully investigate an incident and to have trust in the audit data that is generated, it is important to put in place data protections. Without integrity protections, unauthorized changes may be ...Rule Medium Severity -
SRG-APP-000131-CTR-000285
Group -
OpenShift must verify container images.
The container platform must be capable of validating that container images are signed and that the digital signature is from a recognized and source approved by the organization. Allowing any conta...Rule Medium Severity -
SRG-APP-000141-CTR-000320
Group -
OpenShift must contain only container images for those capabilities being offered by the container platform.
Allowing container images to reside within the container platform registry that are not essential to the capabilities being offered by the container platform becomes a potential security risk. By a...Rule Medium Severity -
SRG-APP-000142-CTR-000325
Group -
OpenShift runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.
OpenShift Container Platform uses several IPV4 and IPV6 ports and protocols to facilitate cluster communication and coordination. Not all these ports are identified and approved by the PPSM CAL. Th...Rule Medium Severity -
SRG-APP-000148-CTR-000335
Group -
SRG-APP-000149-CTR-000355
Group -
OpenShift must use multifactor authentication for network access to accounts.
Without the use of multifactor authentication, the ease of access to privileged and nonprivileged functions is greatly increased. Multifactor authentication requires using two or more factors to a...Rule Medium Severity -
SRG-APP-000156-CTR-000380
Group -
SRG-APP-000172-CTR-000440
Group -
OpenShift must use FIPS validated LDAP or OpenIDConnect.
Passwords need to be protected on entry, in transmission, during authentication, and when stored. If compromised at any of these security points, a nefarious user can use the password along with st...Rule High Severity -
SRG-APP-000190-CTR-000500
Group -
SRG-APP-000211-CTR-000530
Group -
OpenShift must separate user functionality (including user interface services) from information system management functionality.
Red Hat Enterprise Linux CoreOS (RHCOS) is a single-purpose container operating system. RHCOS is only supported as a component of the OpenShift Container Platform. Remote management of the RHCOS no...Rule Medium Severity -
SRG-APP-000219-CTR-000550
Group -
OpenShift must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 validated cryptography.
FIPS compliance is one of the most critical components required in highly secure environments, to ensure that only supported cryptographic technologies are allowed on nodes. Because FIPS must be e...Rule High Severity -
SRG-APP-000233-CTR-000585
Group -
OpenShift runtime must isolate security functions from nonsecurity functions.
An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Security functions are the hardware, software, and/...Rule Medium Severity -
SRG-APP-000243-CTR-000600
Group -
OpenShift must prevent unauthorized and unintended information transfer via shared system resources and enable page poisoning.
Enabling page poisoning in OpenShift improves memory safety, mitigates memory corruption vulnerabilities, aids in fault isolation, assists with debugging. It enhances the overall security and stabi...Rule Medium Severity -
SRG-APP-000243-CTR-000600
Group -
OpenShift must disable virtual syscalls.
Virtual syscalls are a mechanism that allows user-space programs to make privileged system calls without transitioning to kernel mode. However, this feature can introduce additional security risks....Rule Medium Severity -
SRG-APP-000243-CTR-000600
Group -
OpenShift must enable poisoning of SLUB/SLAB objects.
By enabling poisoning of SLUB/SLAB objects, OpenShift can detect and identify use-after-free scenarios more effectively. The poisoned objects are marked as invalid or inaccessible, causing crashes ...Rule Medium Severity -
SRG-APP-000243-CTR-000600
Group -
OpenShift must set the sticky bit for world-writable directories.
Removing world-writable permissions or setting the sticky bit helps enforce access control on directories within the OpenShift platform. World-writable permissions allow any user to modify or delet...Rule Medium Severity -
SRG-APP-000243-CTR-000600
Group -
OpenShift must restrict access to the kernel buffer.
Restricting access to the kernel buffer in OpenShift is crucial for preventing unauthorized access, protecting system stability, mitigating kernel-level attacks, preventing information leakage, and...Rule Medium Severity -
SRG-APP-000243-CTR-000600
Group -
SRG-APP-000246-CTR-000605
Group -
OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by setting a default Resource Quota.
OpenShift allows administrators to define resource quotas on a namespace basis. This allows tailoring of the shared resources based on a project needs. However, when a new project is created, unles...Rule Medium Severity -
SRG-APP-000246-CTR-000605
Group -
SRG-APP-000297-CTR-000705
Group -
OpenShift must display an explicit logout message indicating the reliable termination of authenticated communication sessions.
The OpenShift CLI tool includes an explicit logout option. The web console's default logout will invalidate the user's session token and redirect back to the console page, which will redirect the...Rule Low Severity -
SRG-APP-000342-CTR-000775
Group -
SRG-APP-000357-CTR-000800
Group -
Red Hat Enterprise Linux CoreOS (RHCOS) must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility.
To ensure RHCOS has a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocate audit record storage capacity. The task of allocating audit record ...Rule Low Severity -
SRG-APP-000360-CTR-000815
Group -
SRG-APP-000381-CTR-000905
Group -
OpenShift must enforce access restrictions and support auditing of the enforcement actions.
Enforcing access restrictions helps protect the OpenShift environment and its resources from unauthorized access, misuse, or malicious activities. By implementing access controls, OpenShift ensures...Rule Medium Severity -
SRG-APP-000384-CTR-000915
Group -
OpenShift must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
Integrity of the OpenShift platform is handled by the cluster version operator. The cluster version operator will by default GPG verify the integrity of the release image before applying it. The re...Rule Medium Severity -
SRG-APP-000400-CTR-000960
Group -
SRG-APP-000414-CTR-001010
Group -
Vulnerability scanning applications must implement privileged access authorization to all OpenShift components, containers, and container images for selected organization-defined vulnerability scanning activities.
OpenShift uses service accounts to provide applications running on or off the platform access to the API service using the enforced RBAC policies. Vulnerability scanning applications that need acce...Rule Medium Severity -
SRG-APP-000429-CTR-001060
Group -
OpenShift keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.
By default, etcd data is not encrypted in OpenShift Container Platform. Enable etcd encryption for the cluster to provide an additional layer of data security. For example, it can help protect the ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.