I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000116-CTR-000235
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux CoreOS (RHCOS) chrony Daemon must use multiple NTP servers to generate audit record time stamps.
<VulnDiscussion>Utilizing multiple NTP servers for the chrony daemon in RHCOS ensures accurate and reliable audit record timestamps. It impro...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must protect audit logs from any type of unauthorized access.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must protect system journal file from any type of unauthorized access by setting file permissions.
<VulnDiscussion>It is a fundamental security practice to enforce the principle of least privilege, where only the necessary permissions are g...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must protect system journal file from any type of unauthorized access by setting owner permissions.
<VulnDiscussion>OpenShift follows the principle of least privilege, which aims to restrict access to resources based on user roles and respon...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must protect log directory from any type of unauthorized access by setting file permissions.
<VulnDiscussion>Log files contain sensitive information such as user credentials, system configurations, and potentially even security-relate...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must protect log directory from any type of unauthorized access by setting owner permissions.
<VulnDiscussion>OpenShift follows the principle of least privilege, which aims to restrict access to resources based on user roles and respon...Rule Medium Severity -
SRG-APP-000118-CTR-000240
<GroupDescription></GroupDescription>Group -
OpenShift must protect pod log files from any type of unauthorized access by setting owner permissions.
<VulnDiscussion>Pod log files may contain sensitive information such as application data, user credentials, or system configurations. Unautho...Rule Medium Severity -
SRG-APP-000119-CTR-000245
<GroupDescription></GroupDescription>Group -
OpenShift must protect audit information from unauthorized modification.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000121-CTR-000255
<GroupDescription></GroupDescription>Group -
OpenShift must prevent unauthorized changes to logon UIDs.
<VulnDiscussion>Logon UIDs are used to uniquely identify and authenticate users within the system. By preventing unauthorized changes to logo...Rule Medium Severity -
SRG-APP-000121-CTR-000255
<GroupDescription></GroupDescription>Group -
OpenShift must protect audit tools from unauthorized access.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.