Skip to content

Red Hat OpenShift Container Platform 4.12 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000014-CTR-000035

    Group
  • SRG-APP-000014-CTR-000040

    Group
  • OpenShift must use TLS 1.2 or greater for secure communication.

    The authenticity and integrity of the container platform and communication between nodes and components must be secure. If an insecure protocol is used during transmission of data, the data can be ...
    Rule Medium Severity
  • SRG-APP-000023-CTR-000055

    Group
  • OpenShift must use a centralized user management solution to support account management functions.

    OpenShift supports several different types of identity providers. To add users and grant access to OpenShift, an identity provider must be configured. Some of the identity provider types such as HT...
    Rule Medium Severity
  • SRG-APP-000023-CTR-000055

    Group
  • The kubeadmin account must be disabled.

    Using a centralized user management solution for account management functions enhances security, simplifies administration, improves user experience, facilitates compliance, and provides scalabilit...
    Rule Medium Severity
  • SRG-APP-000026-CTR-000070

    Group
  • SRG-APP-000027-CTR-000075

    Group
  • OpenShift must automatically audit account modification.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to modify an exis...
    Rule Medium Severity
  • SRG-APP-000028-CTR-000080

    Group
  • SRG-APP-000029-CTR-000085

    Group
  • Open Shift must automatically audit account removal actions.

    When application accounts are removed, user accessibility is affected. Once an attacker establishes access to an application, the attacker often attempts to remove authorized accounts to disrupt se...
    Rule Medium Severity
  • SRG-APP-000033-CTR-000090

    Group
  • SRG-APP-000038-CTR-000105

    Group
  • OpenShift must enforce network policy on the namespace for controlling the flow of information within the container platform based on organization-defined information flow control policies.

    OpenShift provides several layers of protection to control the flow of information between the container platform components and user services. Each user project is given a separate namespace and O...
    Rule Medium Severity
  • SRG-APP-000039-CTR-000110

    Group
  • OpenShift must enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies.

    OpenShift provides several layers of protection to control the flow of information between the container platform components and user services. Each user project is given a separate namespace and O...
    Rule Medium Severity
  • SRG-APP-000068-CTR-000120

    Group
  • SRG-APP-000089-CTR-000150

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules