Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000435-CTR-001070

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by defining resource quotas on a namespace.

    &lt;VulnDiscussion&gt;OpenShift allows administrators to define resource quotas on a namespace basis. This allows tailoring of the shared resources...
    Rule Medium Severity
  • SRG-APP-000439-CTR-001080

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;OpenShift provides for two types of application level ingress types, Routes, and Ingresses. Routes have been a part of OpenSh...
    Rule Medium Severity
  • SRG-APP-000450-CTR-001105

    <GroupDescription></GroupDescription>
    Group
  • Red Hat Enterprise Linux CoreOS (RHCOS) must implement nonexecutable data to protect its memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;The NX bit is a hardware feature that prevents the execution of code from data memory regions. By enabling NX bit execute pro...
    Rule Medium Severity
  • SRG-APP-000450-CTR-001105

    <GroupDescription></GroupDescription>
    Group
  • Red Hat Enterprise Linux CoreOS (RHCOS) must implement ASLR (Address Space Layout Randomization) from unauthorized code execution.

    &lt;VulnDiscussion&gt;ASLR is a security technique that randomizes the memory layout of processes, making it more difficult for attackers to predic...
    Rule Medium Severity
  • SRG-APP-000454-CTR-001110

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must remove old components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of OpenShift components that are not removed from the container platform after updates have been installed ...
    Rule Medium Severity
  • SRG-APP-000456-CTR-001125

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs.

    &lt;VulnDiscussion&gt;It is critical to the security and stability of the container platform and the software services running on the platform to e...
    Rule Medium Severity
  • SRG-APP-000456-CTR-001130

    <GroupDescription></GroupDescription>
    Group
  • OpenShift runtime must have updates installed within the period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;OpenShift runtime must be carefully monitored for vulnerabilities, and when problems are detected, they must be remediated qu...
    Rule Medium Severity
  • SRG-APP-000472-CTR-001170

    <GroupDescription></GroupDescription>
    Group
  • The Compliance Operator must be configured.

    &lt;VulnDiscussion&gt;The Compliance Operator enables continuous compliance monitoring within OpenShift. It regularly assesses the environment agai...
    Rule Medium Severity
  • SRG-APP-000473-CTR-001175

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must perform verification of the correct operation of security functions: upon startup and/or restart; upon command by a user with privileged access; and/or every 30 days.

    &lt;VulnDiscussion&gt;Security functionality includes, but is not limited to, establishing system accounts, configuring access authorization (i.e.,...
    Rule Medium Severity
  • SRG-APP-000495-CTR-001235

    <GroupDescription></GroupDescription>
    Group
  • OpenShift must generate audit records when successful/unsuccessful attempts to modify privileges occur.

    &lt;VulnDiscussion&gt;Audit records provide a crucial source of information for security monitoring and incident response. By generating audit reco...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules