I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000100
<GroupDescription></GroupDescription>Group -
All audit records must identify any users associated with the event within the container platform.
<VulnDiscussion>Without information that establishes the identity of the user associated with the events, security personnel cannot determine...Rule Medium Severity -
SRG-APP-000100
<GroupDescription></GroupDescription>Group -
All audit records must identify any containers associated with the event within the container platform.
<VulnDiscussion>Without information that establishes the identity of the containers offering user services or running on behalf of a user wit...Rule Medium Severity -
SRG-APP-000101
<GroupDescription></GroupDescription>Group -
The container platform must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
<VulnDiscussion>During an investigation of an incident, it is important to fully understand what took place. Often, information is not part o...Rule Medium Severity -
SRG-APP-000109
<GroupDescription></GroupDescription>Group -
The container platform must take appropriate action upon an audit failure.
<VulnDiscussion>It is critical that when the container platform is at risk of failing to process audit logs as required that it take action t...Rule Medium Severity -
SRG-APP-000111
<GroupDescription></GroupDescription>Group -
The container platform components must provide the ability to send audit logs to a central enterprise repository for review and analysis.
<VulnDiscussion>The container platform components must send audit events to a central managed audit log repository to provide reporting, anal...Rule Medium Severity -
SRG-APP-000116
<GroupDescription></GroupDescription>Group -
The container platform must use internal system clocks to generate audit record time stamps.
<VulnDiscussion>Understanding when and sequence of events for an incident is crucial to understand what may have taken place. Without a commo...Rule Medium Severity -
SRG-APP-000118
<GroupDescription></GroupDescription>Group -
The container platform must protect audit information from any type of unauthorized read access.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000119
<GroupDescription></GroupDescription>Group -
The container platform must protect audit information from unauthorized modification.
<VulnDiscussion>If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...Rule Medium Severity -
SRG-APP-000120
<GroupDescription></GroupDescription>Group -
The container platform must protect audit information from unauthorized deletion.
<VulnDiscussion>If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...Rule Medium Severity -
SRG-APP-000121
<GroupDescription></GroupDescription>Group -
The container platform must protect audit tools from unauthorized access.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-APP-000122
<GroupDescription></GroupDescription>Group -
The container platform must protect audit tools from unauthorized modification.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-APP-000123
<GroupDescription></GroupDescription>Group -
The container platform must protect audit tools from unauthorized deletion.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-APP-000126
<GroupDescription></GroupDescription>Group -
The container platform must use FIPS validated cryptographic mechanisms to protect the integrity of log information.
<VulnDiscussion>To fully investigate an incident and to have trust in the audit data that is generated, it is important to put in place data ...Rule Medium Severity -
SRG-APP-000131
<GroupDescription></GroupDescription>Group -
The container platform must be built from verified packages.
<VulnDiscussion>It is important to patch and upgrade the container platform when patches and upgrades are available. More important is to get...Rule Medium Severity -
SRG-APP-000131
<GroupDescription></GroupDescription>Group -
The container platform must verify container images.
<VulnDiscussion>The container platform must be capable of validating container images are signed and that the digital signature is from a rec...Rule Medium Severity -
SRG-APP-000133
<GroupDescription></GroupDescription>Group -
The container platform must limit privileges to the container platform registry.
<VulnDiscussion>To control what is instantiated within the container platform, it is important to control access to the registry. Without thi...Rule Medium Severity -
SRG-APP-000133
<GroupDescription></GroupDescription>Group -
The container platform must limit privileges to the container platform runtime.
<VulnDiscussion>To control what is instantiated within the container platform, it is important to control access to the runtime. Without this...Rule Medium Severity -
SRG-APP-000133
<GroupDescription></GroupDescription>Group -
The container platform must limit privileges to the container platform keystore.
<VulnDiscussion>The container platform keystore is used to store credentials used to build a trust between the container platform and some ex...Rule Medium Severity -
SRG-APP-000133
<GroupDescription></GroupDescription>Group -
Configuration files for the container platform must be protected.
<VulnDiscussion>The secure configuration of the container platform must be protected by disallowing changes to be implemented by non-privileg...Rule Medium Severity -
SRG-APP-000133
<GroupDescription></GroupDescription>Group -
Authentication files for the container platform must be protected.
<VulnDiscussion>The secure configuration of the container platform must be protected by disallowing changing to be implemented by non-privile...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The container platform must be configured with only essential configurations.
<VulnDiscussion>The container platform can be built with components that are not used for the intended purpose of the organization. To limit ...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The container platform registry must contain only container images for those capabilities being offered by the container platform.
<VulnDiscussion>Allowing container images to reside within the container platform registry that are not essential to the capabilities being o...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
The container platform runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.
<VulnDiscussion>Ports, protocols, and services within the container platform runtime must be controlled and conform to the PPSM CAL. Those po...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
The container platform runtime must enforce the use of ports that are non-privileged.
<VulnDiscussion>Privileged ports are those ports below 1024 and that require system privileges for their use. If containers are able to use t...Rule Medium Severity -
SRG-APP-000148
<GroupDescription></GroupDescription>Group -
The container platform must uniquely identify and authenticate users.
<VulnDiscussion>The container platform requires user accounts to perform container platform tasks. These tasks may pertain to the overall con...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.