I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000447
<GroupDescription></GroupDescription>Group -
The container platform must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
<VulnDiscussion>Software or code parameters typically follow well-defined protocols that use structured messages (i.e., commands or queries) ...Rule Medium Severity -
SRG-APP-000450
<GroupDescription></GroupDescription>Group -
The container platform must implement organization-defined security safeguards to protect system CPU and memory from resource depletion and unauthorized code execution.
<VulnDiscussion>The execution of images within the container platform runtime must implement organizational defined security safeguards to pr...Rule Medium Severity -
SRG-APP-000454
<GroupDescription></GroupDescription>Group -
The container platform must remove old components after updated versions have been installed.
<VulnDiscussion>Previous versions of container platform components that are not removed from the container platform after updates have been i...Rule Medium Severity -
SRG-APP-000454
<GroupDescription></GroupDescription>Group -
The container platform registry must remove old container images after updating versions have been made available.
<VulnDiscussion>Obsolete and stale images need to be removed from the registry to ensure the container platform maintains a secure posture. W...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
The container platform registry must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs.
<VulnDiscussion>Software supporting the container platform, images in the registry must stay up to date with the latest patches, service pack...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
The container platform runtime must have updates installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>The container platform runtime must be carefully monitored for vulnerabilities, and when problems are detected, they must be ...Rule Medium Severity -
SRG-APP-000472
<GroupDescription></GroupDescription>Group -
The organization-defined role must verify correct operation of security functions in the container platform.
<VulnDiscussion>Without verification, security functions may not operate correctly and this failure may go unnoticed within the container pla...Rule Medium Severity -
SRG-APP-000473
<GroupDescription></GroupDescription>Group -
The container platform must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days. Security functionality includes, but is not limited to, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters.
<VulnDiscussion>Without verification, security functions may not operate correctly and this failure may go unnoticed within the container pla...Rule Medium Severity -
SRG-APP-000474
<GroupDescription></GroupDescription>Group -
The container platform must provide system notifications to the system administrator and operational staff when anomalies in the operation of the organization-defined security functions are discovered.
<VulnDiscussion>If anomalies are not acted upon, security functions may fail to secure the container within the container platform runtime. ...Rule Medium Severity -
SRG-APP-000492
<GroupDescription></GroupDescription>Group -
The container platform must generate audit records when successful/unsuccessful attempts to access security objects occur.
<VulnDiscussion>The container platform and its components must generate audit records when successful and unsuccessful access security object...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.