Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • Vulnerability scanning applications must implement privileged access authorization to all OpenShift components, containers, and container images for selected organization-defined vulnerability scanning activities.

    <VulnDiscussion>OpenShift uses service accounts to provide applications running on or off the platform access to the API service using the en...
    Rule Medium Severity
  • SRG-APP-000429-CTR-001060

    <GroupDescription></GroupDescription>
    Group
  • OpenShift keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.

    &lt;VulnDiscussion&gt;By default, etcd data is not encrypted in OpenShift Container Platform. Enable etcd encryption for the cluster to provide an ...
    Rule Medium Severity
  • SRG-APP-000435-CTR-001070

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by employing organization-defined security safeguards by including a default resource quota.

    &lt;VulnDiscussion&gt;DNS attacks that are internal to the container platform (exploited or otherwise malicious applications) can have a limited bl...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules