Red Hat OpenShift Container Platform 4.12 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000116-CTR-000235
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux CoreOS (RHCOS) chrony Daemon must use multiple NTP servers to generate audit record time stamps.
<VulnDiscussion>Utilizing multiple NTP servers for the chrony daemon in RHCOS ensures accurate and reliable audit record timestamps. It impro...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must enable poisoning of SLUB/SLAB objects.
<VulnDiscussion>By enabling poisoning of SLUB/SLAB objects, OpenShift can detect and identify use-after-free scenarios more effectively. The ...Rule Medium Severity -
SRG-APP-000243-CTR-000600
<GroupDescription></GroupDescription>Group -
OpenShift must protect audit logs from any type of unauthorized access.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must protect system journal file from any type of unauthorized access by setting file permissions.
<VulnDiscussion>It is a fundamental security practice to enforce the principle of least privilege, where only the necessary permissions are g...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must protect system journal file from any type of unauthorized access by setting owner permissions.
<VulnDiscussion>OpenShift follows the principle of least privilege, which aims to restrict access to resources based on user roles and respon...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must protect log directory from any type of unauthorized access by setting file permissions.
<VulnDiscussion>Log files contain sensitive information such as user credentials, system configurations, and potentially even security-relate...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must set the sticky bit for world-writable directories.
<VulnDiscussion>Removing world-writable permissions or setting the sticky bit helps enforce access control on directories within the OpenShif...Rule Medium Severity -
OpenShift must protect log directory from any type of unauthorized access by setting owner permissions.
<VulnDiscussion>OpenShift follows the principle of least privilege, which aims to restrict access to resources based on user roles and respon...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must protect pod log files from any type of unauthorized access by setting owner permissions.
<VulnDiscussion>Pod log files may contain sensitive information such as application data, user credentials, or system configurations. Unautho...Rule Medium Severity -
SRG-APP-000119-CTR-000245
<GroupDescription></GroupDescription>Group -
OpenShift must protect audit information from unauthorized modification.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000121-CTR-000255
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.