I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000412
<GroupDescription></GroupDescription>Group -
The container platform must configure web management tools and Application Program Interfaces (API) with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule Medium Severity -
SRG-APP-000414
<GroupDescription></GroupDescription>Group -
Vulnerability scanning applications must implement privileged access authorization to all container platform components, containers, and container images for selected organization-defined vulnerability scanning activities.
<VulnDiscussion>In certain situations, the nature of the vulnerability scanning may be more intrusive, or the container platform component th...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The container platform must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data and images. The...Rule Medium Severity -
SRG-APP-000429
<GroupDescription></GroupDescription>Group -
The container platform keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.
<VulnDiscussion>Container platform keystore is used for container deployments for persistent storage of all its REST API objects. These objec...Rule Medium Severity -
SRG-APP-000431
<GroupDescription></GroupDescription>Group -
The container platform runtime must maintain separate execution domains for each container by assigning each container a separate address space.
<VulnDiscussion>Container namespace access is limited upon runtime execution. Each container is a distinct process so that communication betw...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
The container platform must protect against or limit the effects of all types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
The application must protect the confidentiality and integrity of transmitted information.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...Rule High Severity -
SRG-APP-000441
<GroupDescription></GroupDescription>Group -
The container platform must maintain the confidentiality and integrity of information during preparation for transmission.
<VulnDiscussion>Information may be unintentionally or maliciously disclosed or modified during preparation for transmission within the contai...Rule Medium Severity -
SRG-APP-000442
<GroupDescription></GroupDescription>Group -
The container platform must maintain the confidentiality and integrity of information during reception.
<VulnDiscussion>Information either can be unintentionally or maliciously disclosed or modified during reception for reception within the cont...Rule Medium Severity -
SRG-APP-000447
<GroupDescription></GroupDescription>Group -
The container platform must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
<VulnDiscussion>Software or code parameters typically follow well-defined protocols that use structured messages (i.e., commands or queries) ...Rule Medium Severity -
SRG-APP-000450
<GroupDescription></GroupDescription>Group -
The container platform must implement organization-defined security safeguards to protect system CPU and memory from resource depletion and unauthorized code execution.
<VulnDiscussion>The execution of images within the container platform runtime must implement organizational defined security safeguards to pr...Rule Medium Severity -
SRG-APP-000454
<GroupDescription></GroupDescription>Group -
The container platform must remove old components after updated versions have been installed.
<VulnDiscussion>Previous versions of container platform components that are not removed from the container platform after updates have been i...Rule Medium Severity -
SRG-APP-000454
<GroupDescription></GroupDescription>Group -
The container platform registry must remove old container images after updating versions have been made available.
<VulnDiscussion>Obsolete and stale images need to be removed from the registry to ensure the container platform maintains a secure posture. W...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
The container platform registry must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs.
<VulnDiscussion>Software supporting the container platform, images in the registry must stay up to date with the latest patches, service pack...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
The container platform runtime must have updates installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>The container platform runtime must be carefully monitored for vulnerabilities, and when problems are detected, they must be ...Rule Medium Severity -
SRG-APP-000472
<GroupDescription></GroupDescription>Group -
The organization-defined role must verify correct operation of security functions in the container platform.
<VulnDiscussion>Without verification, security functions may not operate correctly and this failure may go unnoticed within the container pla...Rule Medium Severity -
SRG-APP-000473
<GroupDescription></GroupDescription>Group -
The container platform must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days. Security functionality includes, but is not limited to, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters.
<VulnDiscussion>Without verification, security functions may not operate correctly and this failure may go unnoticed within the container pla...Rule Medium Severity -
SRG-APP-000474
<GroupDescription></GroupDescription>Group -
The container platform must provide system notifications to the system administrator and operational staff when anomalies in the operation of the organization-defined security functions are discovered.
<VulnDiscussion>If anomalies are not acted upon, security functions may fail to secure the container within the container platform runtime. ...Rule Medium Severity -
SRG-APP-000492
<GroupDescription></GroupDescription>Group -
The container platform must generate audit records when successful/unsuccessful attempts to access security objects occur.
<VulnDiscussion>The container platform and its components must generate audit records when successful and unsuccessful access security object...Rule Medium Severity -
SRG-APP-000493
<GroupDescription></GroupDescription>Group -
The container platform must generate audit records when successful/unsuccessful attempts to access security levels occur.
<VulnDiscussion>Unauthorized users could access the security levels to exploit vulnerabilities within the container platform component. All t...Rule Medium Severity -
SRG-APP-000494
<GroupDescription></GroupDescription>Group -
The container platform must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000495
<GroupDescription></GroupDescription>Group -
The container platform must generate audit records when successful/unsuccessful attempts to modify privileges occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000496
<GroupDescription></GroupDescription>Group -
The container platform must generate audit records when successful/unsuccessful attempts to modify security objects occur.
<VulnDiscussion>The container platform and its components must generate audit records when modifying security objects. All the components mus...Rule Medium Severity -
SRG-APP-000497
<GroupDescription></GroupDescription>Group -
The container platform must generate audit records when successful/unsuccessful attempts to modify security levels occur.
<VulnDiscussion>Unauthorized users could modify the security levels to exploit vulnerabilities within the container platform component. All t...Rule Medium Severity -
SRG-APP-000498
<GroupDescription></GroupDescription>Group -
The container platform must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.