Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000384-CTR-000915

    <GroupDescription></GroupDescription>
    Group
  • The configuration integrity of the container platform must be ensured and vulnerabilities policies must be configured.

    &lt;VulnDiscussion&gt;Prisma Cloud Compute's vulnerabilities defense is the set of features that provides both predictive and threat-based active p...
    Rule High Severity
  • SRG-APP-000384-CTR-000915

    <GroupDescription></GroupDescription>
    Group
  • Prisma Cloud Compute must be configured to scan images that have not been instantiated as containers.

    &lt;VulnDiscussion&gt;Prisma Cloud Compute ships with "only scan images with running containers" set to "on". To meet the requirements, "only scan ...
    Rule High Severity
  • SRG-APP-000390-CTR-000930

    <GroupDescription></GroupDescription>
    Group
  • Prisma Cloud Compute Defender must reestablish communication to the Console via mutual TLS v1.2 WebSocket session.

    &lt;VulnDiscussion&gt;When the secure WebSocket session between the Prisma Cloud Compute Console and Defenders is disconnected, the Defender will c...
    Rule Medium Severity
  • SRG-APP-000414-CTR-001010

    <GroupDescription></GroupDescription>
    Group
  • Prisma Cloud Compute Defender containers must run as root.

    &lt;VulnDiscussion&gt;In certain situations, the nature of the vulnerability scanning may be more intrusive, or the container platform component th...
    Rule Medium Severity
  • SRG-APP-000431-CTR-001065

    <GroupDescription></GroupDescription>
    Group
  • Prisma Cloud Compute must run within a defined/separate namespace (e.g., Twistlock).

    &lt;VulnDiscussion&gt;Namespaces are a key boundary for network policies, orchestrator access control restrictions, and other important security co...
    Rule Medium Severity
  • SRG-APP-000439-CTR-001080

    <GroupDescription></GroupDescription>
    Group
  • Prisma Cloud Compute must protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...
    Rule High Severity
  • SRG-APP-000454-CTR-001110

    <GroupDescription></GroupDescription>
    Group
  • Prisma Cloud Compute must be running the latest release.

    &lt;VulnDiscussion&gt;Prisma Cloud Compute releases are distributed as Docker images. Each release updates or removes components as needed based on...
    Rule Medium Severity
  • SRG-APP-000456-CTR-001130

    <GroupDescription></GroupDescription>
    Group
  • Prisma Cloud Compute's Intelligence Stream must be kept up to date.

    &lt;VulnDiscussion&gt;The Prisma Cloud Compute Console pulls the latest vulnerability and threat information from the Intelligence Stream (intellig...
    Rule Medium Severity
  • SRG-APP-000473-CTR-001175

    <GroupDescription></GroupDescription>
    Group
  • Configuration of Prisma Cloud Compute must be continuously verified.

    &lt;VulnDiscussion&gt;Prisma Cloud Compute's configuration of Defender deployment must be monitored to ensure monitoring and protection of the envi...
    Rule Medium Severity
  • SRG-APP-000610-CTR-001385

    <GroupDescription></GroupDescription>
    Group
  • Prisma Cloud Compute release tar distributions must have an associated SHA-256 digest.

    &lt;VulnDiscussion&gt;Each Prisma Cloud Compute release's tar file has an associated SHA-256 digest hash value to ensure the components have not be...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules