Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000126-CTR-000275

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must use FIPS-validated cryptographic mechanisms to protect the integrity of log information.

    &lt;VulnDiscussion&gt;To fully investigate an incident and to have trust in the audit data that is generated, it is important to put in place data ...
    Rule Medium Severity
  • SRG-APP-000131-CTR-000285

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must verify container images.

    &lt;VulnDiscussion&gt;The container platform must be capable of validating that container images are signed and that the digital signature is from ...
    Rule Medium Severity
  • SRG-APP-000141-CTR-000320

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must contain only container images for those capabilities being offered by the container platform.

    &lt;VulnDiscussion&gt;Allowing container images to reside within the container platform registry that are not essential to the capabilities being o...
    Rule Medium Severity
  • SRG-APP-000142-CTR-000325

    <GroupDescription></GroupDescription>
    Group
  • OpenShift runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.

    &lt;VulnDiscussion&gt;OpenShift Container Platform uses several IPV4 and IPV6 ports and protocols to facilitate cluster communication and coordinat...
    Rule Medium Severity
  • SRG-APP-000148-CTR-000335

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must disable root and terminate network connections.

    &lt;VulnDiscussion&gt;Direct login as the "root" user must be disabled to prevent unrestricted access and control over the entire system. Termina...
    Rule High Severity
  • SRG-APP-000149-CTR-000355

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must use multifactor authentication for network access to accounts.

    &lt;VulnDiscussion&gt;Without the use of multifactor authentication, the ease of access to privileged and nonprivileged functions is greatly increa...
    Rule Medium Severity
  • SRG-APP-000156-CTR-000380

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...
    Rule Medium Severity
  • SRG-APP-000172-CTR-000440

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must use FIPS validated LDAP or OpenIDConnect.

    &lt;VulnDiscussion&gt;Passwords need to be protected on entry, in transmission, during authentication, and when stored. If compromised at any of th...
    Rule High Severity
  • SRG-APP-000190-CTR-000500

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.

    &lt;VulnDiscussion&gt;In OpenShift, the "session token inactivity timeout" on OAuth clients is set to ensure security and protect against potential...
    Rule Medium Severity
  • SRG-APP-000211-CTR-000530

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must separate user functionality (including user interface services) from information system management functionality.

    &lt;VulnDiscussion&gt;Red Hat Enterprise Linux CoreOS (RHCOS) is a single-purpose container operating system. RHCOS is only supported as a componen...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules