Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000014-CTR-000040

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must use TLS 1.2 or greater for secure communication.

    &lt;VulnDiscussion&gt;The authenticity and integrity of the container platform and communication between nodes and components must be secure. If an...
    Rule Medium Severity
  • SRG-APP-000023-CTR-000055

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must use a centralized user management solution to support account management functions.

    &lt;VulnDiscussion&gt;OpenShift supports several different types of identity providers. To add users and grant access to OpenShift, an identity pro...
    Rule Medium Severity
  • SRG-APP-000023-CTR-000055

    <GroupDescription></GroupDescription>
    Group
  • The kubeadmin account must be disabled.

    &lt;VulnDiscussion&gt;Using a centralized user management solution for account management functions enhances security, simplifies administration, i...
    Rule Medium Severity
  • SRG-APP-000026-CTR-000070

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must automatically audit account creation.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-APP-000027-CTR-000075

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must automatically audit account modification.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-APP-000028-CTR-000080

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must generate audit rules to capture account related actions.

    &lt;VulnDiscussion&gt;Account management actions, such as creation, modification, disabling, removal, and enabling are important changes within the...
    Rule Medium Severity
  • SRG-APP-000029-CTR-000085

    <GroupDescription></GroupDescription>
    Group
  • Open Shift must automatically audit account removal actions.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Once an attacker establishes access to an application,...
    Rule Medium Severity
  • SRG-APP-000033-CTR-000090

    <GroupDescription></GroupDescription>
    Group
  • OpenShift RBAC access controls must be enforced.

    &lt;VulnDiscussion&gt;Controlling and limiting users access to system services and resources is key to securing the platform and limiting the inten...
    Rule High Severity
  • SRG-APP-000038-CTR-000105

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must enforce network policy on the namespace for controlling the flow of information within the container platform based on organization-defined information flow control policies.

    &lt;VulnDiscussion&gt;OpenShift provides several layers of protection to control the flow of information between the container platform components ...
    Rule Medium Severity
  • SRG-APP-000039-CTR-000110

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies.

    &lt;VulnDiscussion&gt;OpenShift provides several layers of protection to control the flow of information between the container platform components ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules