Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000181

    <GroupDescription></GroupDescription>
    Group
  • The container platform must provide an audit reduction capability that supports on-demand reporting requirements.

    &lt;VulnDiscussion&gt;The ability to generate on-demand reports, including after the audit data has been subjected to audit reduction, greatly faci...
    Rule Medium Severity
  • SRG-APP-000185

    <GroupDescription></GroupDescription>
    Group
  • The container platform must employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the syst...
    Rule Medium Severity
  • SRG-APP-000190

    <GroupDescription></GroupDescription>
    Group
  • The application must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-APP-000211

    <GroupDescription></GroupDescription>
    Group
  • The container platform must separate user functionality (including user interface services) from information system management functionality.

    &lt;VulnDiscussion&gt;Separating user functionality from management functionality is a requirement for all the components within the container plat...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The container platform must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.

    &lt;VulnDiscussion&gt;The container platform is responsible for pulling images from trusted sources and placing those images into its registry. To ...
    Rule High Severity
  • SRG-APP-000225

    <GroupDescription></GroupDescription>
    Group
  • The container platform runtime must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

    &lt;VulnDiscussion&gt;The container platform offers services for container image orchestration and services for users. If any of these services wer...
    Rule Medium Severity
  • SRG-APP-000226

    <GroupDescription></GroupDescription>
    Group
  • The container platform must preserve any information necessary to determine the cause of the disruption or failure.

    &lt;VulnDiscussion&gt;When a failure occurs within the container platform, preserving the state of the container platform and its components, along...
    Rule Medium Severity
  • SRG-APP-000233

    <GroupDescription></GroupDescription>
    Group
  • The container platform runtime must isolate security functions from non-security functions.

    &lt;VulnDiscussion&gt;The container platform runtime must be configured to isolate those services used for security functions from those used for n...
    Rule Medium Severity
  • SRG-APP-000234

    <GroupDescription></GroupDescription>
    Group
  • The container platform must never automatically remove or disable emergency accounts.

    &lt;VulnDiscussion&gt;Emergency accounts are administrator accounts that are established in response to crisis situations where the need for rapid ...
    Rule Medium Severity
  • SRG-APP-000243

    <GroupDescription></GroupDescription>
    Group
  • The container platform must prohibit containers from accessing privileged resources.

    &lt;VulnDiscussion&gt;Containers images instantiated within the container platform may request access to host system resources. Access to privilege...
    Rule Medium Severity
  • SRG-APP-000243

    <GroupDescription></GroupDescription>
    Group
  • The container platform must prevent unauthorized and unintended information transfer via shared system resources.

    &lt;VulnDiscussion&gt;The container platform makes host system resources available to container services. These shared resources, such as the host ...
    Rule Medium Severity
  • SRG-APP-000246

    <GroupDescription></GroupDescription>
    Group
  • The container platform must restrict individuals' ability to launch organizationally defined denial-of-service (DoS) attacks against other information systems.

    &lt;VulnDiscussion&gt;The container platform will offer services to users and these services share resources available on the hosting system. To sh...
    Rule Medium Severity
  • SRG-APP-000266

    <GroupDescription></GroupDescription>
    Group
  • The container platform must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;The container platform is responsible for offering services to users. These services could be across diverse user groups and ...
    Rule Medium Severity
  • SRG-APP-000290

    <GroupDescription></GroupDescription>
    Group
  • The container platform must use cryptographic mechanisms to protect the integrity of audit tools.

    &lt;VulnDiscussion&gt;Protecting the integrity of the tools used for auditing purposes is a critical step to ensuring the integrity of audit data. ...
    Rule Medium Severity
  • SRG-APP-000291

    <GroupDescription></GroupDescription>
    Group
  • The container platform must notify system administrators and ISSO when accounts are created.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...
    Rule Medium Severity
  • SRG-APP-000292

    <GroupDescription></GroupDescription>
    Group
  • The container platform must notify system administrators and ISSO when accounts are modified.

    &lt;VulnDiscussion&gt;When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual user...
    Rule Medium Severity
  • SRG-APP-000293

    <GroupDescription></GroupDescription>
    Group
  • The container platform must notify system administrators and ISSO for account disabling actions.

    &lt;VulnDiscussion&gt;When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual user...
    Rule Medium Severity
  • SRG-APP-000294

    <GroupDescription></GroupDescription>
    Group
  • The container platform must notify system administrators and ISSO for account removal actions.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for ide...
    Rule Medium Severity
  • SRG-APP-000297

    <GroupDescription></GroupDescription>
    Group
  • Access to the container platform must display an explicit logout message to user indicating the reliable termination of authenticated communication sessions.

    &lt;VulnDiscussion&gt;Access to the container platform will occur through web and terminal sessions. Any web interfaces must conform to application...
    Rule Low Severity
  • SRG-APP-000317

    <GroupDescription></GroupDescription>
    Group
  • The container platform must terminate shared/group account credentials when members leave the group.

    &lt;VulnDiscussion&gt;If shared/group account credentials are not terminated when individuals leave the group, the user that left the group can sti...
    Rule Medium Severity
  • SRG-APP-000319

    <GroupDescription></GroupDescription>
    Group
  • The container platform must automatically audit account-enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...
    Rule Medium Severity
  • SRG-APP-000320

    <GroupDescription></GroupDescription>
    Group
  • The container platform must notify system administrator and ISSO of account enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...
    Rule Medium Severity
  • SRG-APP-000340

    <GroupDescription></GroupDescription>
    Group
  • The container platform must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Controlling what users can perform privileged functions prevents unauthorized users from performing tasks that may expose dat...
    Rule Medium Severity
  • SRG-APP-000342

    <GroupDescription></GroupDescription>
    Group
  • Container images instantiated by the container platform must execute using least privileges.

    &lt;VulnDiscussion&gt;Containers running within the container platform must execute as non-privileged. When a container can execute as a privileged...
    Rule Medium Severity
  • SRG-APP-000343

    <GroupDescription></GroupDescription>
    Group
  • The container platform must audit the execution of privileged functions.

    &lt;VulnDiscussion&gt;Privileged functions within the container platform can be component specific or can envelope the entire container platform. B...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules