Container Platform Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Configuration files for the container platform must be protected.
<VulnDiscussion>The secure configuration of the container platform must be protected by disallowing changes to be implemented by non-privileg...Rule Medium Severity -
SRG-APP-000133
<GroupDescription></GroupDescription>Group -
Authentication files for the container platform must be protected.
<VulnDiscussion>The secure configuration of the container platform must be protected by disallowing changing to be implemented by non-privile...Rule Medium Severity -
The container platform must require the change of at least 15 of the total number of characters when passwords are changed.
<VulnDiscussion>If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...Rule Medium Severity -
SRG-APP-000171
<GroupDescription></GroupDescription>Group -
For container platform using password authentication, the application must store only cryptographic representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule Medium Severity -
SRG-APP-000172
<GroupDescription></GroupDescription>Group -
The container platform must prevent unauthorized and unintended information transfer via shared system resources.
<VulnDiscussion>The container platform makes host system resources available to container services. These shared resources, such as the host ...Rule Medium Severity -
SRG-APP-000246
<GroupDescription></GroupDescription>Group -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The container platform must be configured with only essential configurations.
<VulnDiscussion>The container platform can be built with components that are not used for the intended purpose of the organization. To limit ...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The container platform registry must contain only container images for those capabilities being offered by the container platform.
<VulnDiscussion>Allowing container images to reside within the container platform registry that are not essential to the capabilities being o...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
The container platform runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.
<VulnDiscussion>Ports, protocols, and services within the container platform runtime must be controlled and conform to the PPSM CAL. Those po...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
The container platform must uniquely identify all network-connected nodes before establishing any connection.
<VulnDiscussion>A container platform usually consists of multiple nodes. It is important for these nodes to be uniquely identified before a c...Rule Medium Severity -
SRG-APP-000163
<GroupDescription></GroupDescription>Group -
SRG-APP-000014
<GroupDescription></GroupDescription>Group -
The container platform must use a centralized user management solution to support account management functions.
<VulnDiscussion>Enterprise environments make application account management challenging and complex. A manual process for account management ...Rule Medium Severity -
SRG-APP-000024
<GroupDescription></GroupDescription>Group -
The container platform must automatically remove or disable temporary user accounts after 72 hours.
<VulnDiscussion>If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...Rule Medium Severity -
SRG-APP-000025
<GroupDescription></GroupDescription>Group -
The container platform must automatically disable accounts after a 35-day period of account inactivity.
<VulnDiscussion>Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an applicatio...Rule Medium Severity -
SRG-APP-000026
<GroupDescription></GroupDescription>Group -
The container platform must automatically audit account creation.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Medium Severity -
SRG-APP-000027
<GroupDescription></GroupDescription>Group -
The container platform must automatically audit account modification.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Medium Severity -
SRG-APP-000028
<GroupDescription></GroupDescription>Group -
The container platform must automatically audit account-disabling actions.
<VulnDiscussion>When application accounts are disabled, user accessibility is affected. Once an attacker establishes access to an application...Rule Medium Severity -
SRG-APP-000029
<GroupDescription></GroupDescription>Group -
The container platform must automatically audit account removal actions.
<VulnDiscussion>When application accounts are removed, user accessibility is affected. Once an attacker establishes access to an application,...Rule Medium Severity -
SRG-APP-000033
<GroupDescription></GroupDescription>Group -
Least privilege access and need to know must be required to access the container platform registry.
<VulnDiscussion>The container platform registry is used to store images and is the keeper of truth for trusted images within the platform. To...Rule Medium Severity -
SRG-APP-000033
<GroupDescription></GroupDescription>Group -
Least privilege access and need to know must be required to access the container platform runtime.
<VulnDiscussion>The container platform runtime is used to instantiate containers. If this process is accessed by those persons who are not au...Rule Medium Severity -
SRG-APP-000033
<GroupDescription></GroupDescription>Group -
The container platform must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-APP-000091
<GroupDescription></GroupDescription>Group -
The container platform must generate audit records when successful/unsuccessful attempts to access privileges occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000092
<GroupDescription></GroupDescription>Group -
The container platform must initiate session auditing upon startup.
<VulnDiscussion>When the container platform is started, container platform components and user services can also be started. It is important ...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
All audit records must identify what type of event has occurred within the container platform.
<VulnDiscussion>Within the container platform, audit data can be generated from any of the deployed container platform components. This audit...Rule Medium Severity -
SRG-APP-000096
<GroupDescription></GroupDescription>Group -
The container platform audit records must have a date and time association with all events.
<VulnDiscussion>Within the container platform, audit data can be generated from any of the deployed container platform components. This audit...Rule Medium Severity -
SRG-APP-000097
<GroupDescription></GroupDescription>Group -
All audit records must identify where in the container platform the event occurred.
<VulnDiscussion>Within the container platform, audit data can be generated from any of the deployed container platform components. This audit...Rule Medium Severity -
SRG-APP-000098
<GroupDescription></GroupDescription>Group -
The container platform must take appropriate action upon an audit failure.
<VulnDiscussion>It is critical that when the container platform is at risk of failing to process audit logs as required that it take action t...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.