Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000219-CTR-000550

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 validated cryptography.

    &lt;VulnDiscussion&gt;FIPS compliance is one of the most critical components required in highly secure environments, to ensure that only supported ...
    Rule High Severity
  • SRG-APP-000233-CTR-000585

    <GroupDescription></GroupDescription>
    Group
  • OpenShift runtime must isolate security functions from nonsecurity functions.

    &lt;VulnDiscussion&gt;An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must prevent unauthorized and unintended information transfer via shared system resources and enable page poisoning.

    &lt;VulnDiscussion&gt;Enabling page poisoning in OpenShift improves memory safety, mitigates memory corruption vulnerabilities, aids in fault isola...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must disable virtual syscalls.

    &lt;VulnDiscussion&gt;Virtual syscalls are a mechanism that allows user-space programs to make privileged system calls without transitioning to ker...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must enable poisoning of SLUB/SLAB objects.

    &lt;VulnDiscussion&gt;By enabling poisoning of SLUB/SLAB objects, OpenShift can detect and identify use-after-free scenarios more effectively. The ...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must set the sticky bit for world-writable directories.

    &lt;VulnDiscussion&gt;Removing world-writable permissions or setting the sticky bit helps enforce access control on directories within the OpenShif...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must restrict access to the kernel buffer.

    &lt;VulnDiscussion&gt;Restricting access to the kernel buffer in OpenShift is crucial for preventing unauthorized access, protecting system stabili...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must prevent kernel profiling.

    &lt;VulnDiscussion&gt;Kernel profiling involves monitoring and analyzing the behavior of the kernel, including its internal operations and system c...
    Rule Medium Severity
  • SRG-APP-000246-CTR-000605

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by setting a default Resource Quota.

    &lt;VulnDiscussion&gt;OpenShift allows administrators to define resource quotas on a namespace basis. This allows tailoring of the shared resources...
    Rule Medium Severity
  • SRG-APP-000246-CTR-000605

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by rate-limiting.

    &lt;VulnDiscussion&gt;By setting rate limits, OpenShift can control the number of requests or connections allowed from a single source within a spe...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules