Red Hat OpenShift Container Platform 4.12 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000118-CTR-000240
Group -
SRG-APP-000118-CTR-000240
Group -
OpenShift must protect log directory from any type of unauthorized access by setting owner permissions.
OpenShift follows the principle of least privilege, which aims to restrict access to resources based on user roles and responsibilities. This separation of privileges helps mitigate the risk of una...Rule Medium Severity -
SRG-APP-000118-CTR-000240
Group -
OpenShift must protect pod log files from any type of unauthorized access by setting owner permissions.
Pod log files may contain sensitive information such as application data, user credentials, or system configurations. Unauthorized access to these log files can expose sensitive data to malicious a...Rule Medium Severity -
SRG-APP-000119-CTR-000245
Group -
OpenShift must protect audit information from unauthorized modification.
If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult if not impossible to achieve. In ad...Rule Medium Severity -
SRG-APP-000121-CTR-000255
Group -
OpenShift must prevent unauthorized changes to logon UIDs.
Logon UIDs are used to uniquely identify and authenticate users within the system. By preventing unauthorized changes to logon UIDs, OpenShift ensures that user identities remain consistent and acc...Rule Medium Severity -
SRG-APP-000121-CTR-000255
Group -
SRG-APP-000126-CTR-000275
Group -
OpenShift must use FIPS-validated cryptographic mechanisms to protect the integrity of log information.
To fully investigate an incident and to have trust in the audit data that is generated, it is important to put in place data protections. Without integrity protections, unauthorized changes may be ...Rule Medium Severity -
SRG-APP-000131-CTR-000285
Group -
OpenShift must verify container images.
The container platform must be capable of validating that container images are signed and that the digital signature is from a recognized and source approved by the organization. Allowing any conta...Rule Medium Severity -
SRG-APP-000141-CTR-000320
Group -
OpenShift must contain only container images for those capabilities being offered by the container platform.
Allowing container images to reside within the container platform registry that are not essential to the capabilities being offered by the container platform becomes a potential security risk. By a...Rule Medium Severity -
SRG-APP-000142-CTR-000325
Group -
OpenShift runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.
OpenShift Container Platform uses several IPV4 and IPV6 ports and protocols to facilitate cluster communication and coordination. Not all these ports are identified and approved by the PPSM CAL. Th...Rule Medium Severity -
SRG-APP-000148-CTR-000335
Group -
SRG-APP-000149-CTR-000355
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.