Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000435

    <GroupDescription></GroupDescription>
    Group
  • The container platform must protect against or limit the effects of all types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The application must protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...
    Rule High Severity
  • SRG-APP-000441

    <GroupDescription></GroupDescription>
    Group
  • The container platform must maintain the confidentiality and integrity of information during preparation for transmission.

    &lt;VulnDiscussion&gt;Information may be unintentionally or maliciously disclosed or modified during preparation for transmission within the contai...
    Rule Medium Severity
  • SRG-APP-000442

    <GroupDescription></GroupDescription>
    Group
  • The container platform must maintain the confidentiality and integrity of information during reception.

    &lt;VulnDiscussion&gt;Information either can be unintentionally or maliciously disclosed or modified during reception for reception within the cont...
    Rule Medium Severity
  • SRG-APP-000447

    <GroupDescription></GroupDescription>
    Group
  • The container platform must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.

    &lt;VulnDiscussion&gt;Software or code parameters typically follow well-defined protocols that use structured messages (i.e., commands or queries) ...
    Rule Medium Severity
  • SRG-APP-000450

    <GroupDescription></GroupDescription>
    Group
  • The container platform must implement organization-defined security safeguards to protect system CPU and memory from resource depletion and unauthorized code execution.

    &lt;VulnDiscussion&gt;The execution of images within the container platform runtime must implement organizational defined security safeguards to pr...
    Rule Medium Severity
  • SRG-APP-000454

    <GroupDescription></GroupDescription>
    Group
  • The container platform must remove old components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of container platform components that are not removed from the container platform after updates have been i...
    Rule Medium Severity
  • SRG-APP-000454

    <GroupDescription></GroupDescription>
    Group
  • The container platform registry must remove old container images after updating versions have been made available.

    &lt;VulnDiscussion&gt;Obsolete and stale images need to be removed from the registry to ensure the container platform maintains a secure posture. W...
    Rule Medium Severity
  • SRG-APP-000456

    <GroupDescription></GroupDescription>
    Group
  • The container platform registry must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs.

    &lt;VulnDiscussion&gt;Software supporting the container platform, images in the registry must stay up to date with the latest patches, service pack...
    Rule Medium Severity
  • SRG-APP-000456

    <GroupDescription></GroupDescription>
    Group
  • The container platform runtime must have updates installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;The container platform runtime must be carefully monitored for vulnerabilities, and when problems are detected, they must be ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules