Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000400

    <GroupDescription></GroupDescription>
    Group
  • The container platform must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;If cached authentication information is out of date, the validity of the authentication information may be questionable.&lt;/...
    Rule Medium Severity
  • SRG-APP-000401

    <GroupDescription></GroupDescription>
    Group
  • The container platform, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

    &lt;VulnDiscussion&gt;The potential of allowing access to users who are no longer authorized (have revoked certificates) increases unless a local ...
    Rule Medium Severity
  • SRG-APP-000402

    <GroupDescription></GroupDescription>
    Group
  • The container platform must accept Personal Identity Verification (PIV) credentials from other federal agencies.

    &lt;VulnDiscussion&gt;Controlling access to the container platform and its components is paramount in having a secure and stable system. Validating...
    Rule Medium Severity
  • SRG-APP-000409

    <GroupDescription></GroupDescription>
    Group
  • The container platform must audit non-local maintenance and diagnostic sessions' organization-defined audit events associated with non-local maintenance.

    &lt;VulnDiscussion&gt;To fully investigate an attack, it is important to understand the event and those events taking place during the same time pe...
    Rule Medium Severity
  • SRG-APP-000411

    <GroupDescription></GroupDescription>
    Group
  • Container platform applications and Application Program Interfaces (API) used for nonlocal maintenance sessions must use FIPS-validated keyed-hash message authentication code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not verified, and therefore cannot be ...
    Rule Medium Severity
  • SRG-APP-000412

    <GroupDescription></GroupDescription>
    Group
  • The container platform must configure web management tools and Application Program Interfaces (API) with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule Medium Severity
  • SRG-APP-000414

    <GroupDescription></GroupDescription>
    Group
  • Vulnerability scanning applications must implement privileged access authorization to all container platform components, containers, and container images for selected organization-defined vulnerability scanning activities.

    &lt;VulnDiscussion&gt;In certain situations, the nature of the vulnerability scanning may be more intrusive, or the container platform component th...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The container platform must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data and images. The...
    Rule Medium Severity
  • SRG-APP-000429

    <GroupDescription></GroupDescription>
    Group
  • The container platform keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.

    &lt;VulnDiscussion&gt;Container platform keystore is used for container deployments for persistent storage of all its REST API objects. These objec...
    Rule Medium Severity
  • SRG-APP-000431

    <GroupDescription></GroupDescription>
    Group
  • The container platform runtime must maintain separate execution domains for each container by assigning each container a separate address space.

    &lt;VulnDiscussion&gt;Container namespace access is limited upon runtime execution. Each container is a distinct process so that communication betw...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules