Skip to content

Container Platform Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000501

    <GroupDescription></GroupDescription>
    Group
  • The container platform must generate audit records when successful/unsuccessful attempts to delete security objects occur.

    &lt;VulnDiscussion&gt;Unauthorized users modify level the security levels to exploit vulnerabilities within the container platform component. All t...
    Rule Medium Severity
  • SRG-APP-000502

    <GroupDescription></GroupDescription>
    Group
  • The container platform must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-APP-000503

    <GroupDescription></GroupDescription>
    Group
  • The container platform must generate audit records when successful/unsuccessful logon attempts occur.

    &lt;VulnDiscussion&gt;The container platform and its components must generate audit records when successful and unsuccessful logon attempts occur. ...
    Rule Medium Severity
  • SRG-APP-000504

    <GroupDescription></GroupDescription>
    Group
  • The container platform must generate audit record for privileged activities.

    &lt;VulnDiscussion&gt;The container platform components will generate audit records for privilege activities and container platform runtime, regist...
    Rule Medium Severity
  • SRG-APP-000505

    <GroupDescription></GroupDescription>
    Group
  • The container platform runtime must generate audit records when successful/unsuccessful attempts to access objects occur.

    &lt;VulnDiscussion&gt;Container platform runtime objects are defined as configuration files, code, etc. This provides the ability to configure reso...
    Rule Medium Severity
  • SRG-APP-000508

    <GroupDescription></GroupDescription>
    Group
  • Direct access to the container platform must generate audit records.

    &lt;VulnDiscussion&gt;Direct access to the container platform and its components must generate audit records. All the components must use the same ...
    Rule Medium Severity
  • SRG-APP-000509

    <GroupDescription></GroupDescription>
    Group
  • The container platform must generate audit records for all account creations, modifications, disabling, and termination events.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-APP-000510

    <GroupDescription></GroupDescription>
    Group
  • The container runtime must generate audit records for all container execution, shutdown, restart events, and program initiations.

    &lt;VulnDiscussion&gt;The container runtime must generate audit records that are specific to the security and mission needs of the organization. Wi...
    Rule Medium Severity
  • SRG-APP-000514

    <GroupDescription></GroupDescription>
    Group
  • The container platform must use a valid FIPS 140-2 approved cryptographic modules to generate hashes.

    &lt;VulnDiscussion&gt;The cryptographic module used must have at least one validated hash algorithm. This validated hash algorithm must be used to ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The container platform must implement the capability to centrally review and analyze audit records from multiple components within the system.

    &lt;VulnDiscussion&gt;Automated mechanisms for centralized reviews and analyses include Security Information and Event Management products.&lt;/Vul...
    Rule Medium Severity
  • SRG-APP-000795

    <GroupDescription></GroupDescription>
    Group
  • Container platform components must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Container platform components are part of the overall container platform, offering services that enable the container platfor...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The container platform must be able to store and instantiate industry standard container images.

    &lt;VulnDiscussion&gt;Monitoring the container images and containers during their lifecycle is important to guarantee the container platform is sec...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The container platform must continuously scan components, containers, and images for vulnerabilities.

    &lt;VulnDiscussion&gt;Finding vulnerabilities quickly within the container platform and within containers deployed within the platform is important...
    Rule Medium Severity
  • SRG-APP-000560

    <GroupDescription></GroupDescription>
    Group
  • The container platform must prohibit communication using TLS versions 1.0 and 1.1, and SSL 2.0 and 3.0.

    &lt;VulnDiscussion&gt;The container platform and its components will prohibit the use of SSL and unauthorized versions of TLS protocols to properly...
    Rule Medium Severity
  • SRG-APP-000605

    <GroupDescription></GroupDescription>
    Group
  • The container platform must validate certificates used for Transport Layer Security (TLS) functions by performing an RFC 5280-compliant certification path validation.

    &lt;VulnDiscussion&gt;A certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certificatio...
    Rule Medium Severity
  • SRG-APP-000610

    <GroupDescription></GroupDescription>
    Group
  • The container platform must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.

    &lt;VulnDiscussion&gt;Audit information includes all information needed to successfully audit system activity, such as audit records, audit log set...
    Rule Medium Severity
  • The container platform must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).

    &lt;VulnDiscussion&gt;Without the use of digital signature, information can be altered by unauthorized accounts accessing or modifying the containe...
    Rule Medium Severity
  • SRG-APP-000635

    <GroupDescription></GroupDescription>
    Group
  • The container platform must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.

    &lt;VulnDiscussion&gt;Unvalidated cryptography is viewed by NIST as providing no protection to the information or data. In effect, the data would b...
    Rule High Severity
  • SRG-APP-000645

    <GroupDescription></GroupDescription>
    Group
  • The container platform must prohibit or restrict the use of protocols that transmit unencrypted authentication information or use flawed cryptographic algorithms for transmission.

    &lt;VulnDiscussion&gt;The use of secure ports, protocols and services within the container platform must be controlled and conform to the PPSM CAL....
    Rule High Severity
  • SRG-APP-000318

    <GroupDescription></GroupDescription>
    Group
  • The container platform must enforce organization-defined circumstances and/or usage conditions for organization-defined accounts.

    &lt;VulnDiscussion&gt;Activity under unusual conditions can indicate hostile activity. For example, what is normal activity during business hours c...
    Rule Medium Severity
  • SRG-APP-000705

    <GroupDescription></GroupDescription>
    Group
  • The container platform must disable accounts when the accounts are no longer associated to a user.

    &lt;VulnDiscussion&gt;Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...
    Rule Medium Severity
  • SRG-APP-000745

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000820

    <GroupDescription></GroupDescription>
    Group
  • The container platform must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;The purpose of requiring a device that is separate from the system to which the user is attempting to gain access for one of ...
    Rule Medium Severity
  • SRG-APP-000825

    <GroupDescription></GroupDescription>
    Group
  • The container platform must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.

    &lt;VulnDiscussion&gt;The purpose of requiring a device that is separate from the system to which the user is attempting to gain access for one of ...
    Rule Medium Severity
  • SRG-APP-000830

    <GroupDescription></GroupDescription>
    Group
  • The container platform must for password-based authentication, maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multi-factor authe...
    Rule Medium Severity
  • SRG-APP-000835

    <GroupDescription></GroupDescription>
    Group
  • The container platform must for password-based authentication, update the list of passwords on an organization-defined frequency.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multi-factor authe...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules