Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000226

    Group
  • The container platform must preserve any information necessary to determine the cause of the disruption or failure.

    When a failure occurs within the container platform, preserving the state of the container platform and its components, along with other container services, helps to facilitate container platform r...
    Rule Medium Severity
  • SRG-APP-000233

    Group
  • The container platform runtime must isolate security functions from non-security functions.

    The container platform runtime must be configured to isolate those services used for security functions from those used for non-security functions. This separation can be performed using environmen...
    Rule Medium Severity
  • SRG-APP-000234

    Group
  • The container platform must never automatically remove or disable emergency accounts.

    Emergency accounts are administrator accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation ...
    Rule Medium Severity
  • SRG-APP-000243

    Group
  • The container platform must prohibit containers from accessing privileged resources.

    Containers images instantiated within the container platform may request access to host system resources. Access to privileged resources can allow for unauthorized and unintended transfer of inform...
    Rule Medium Severity
  • SRG-APP-000243

    Group
  • The container platform must prevent unauthorized and unintended information transfer via shared system resources.

    The container platform makes host system resources available to container services. These shared resources, such as the host system kernel, network connections, and storage, must be protected to pr...
    Rule Medium Severity
  • SRG-APP-000246

    Group
  • The container platform must restrict individuals' ability to launch organizationally defined denial-of-service (DoS) attacks against other information systems.

    The container platform will offer services to users and these services share resources available on the hosting system. To share the resources in a manner that does not exhaust or over utilize reso...
    Rule Medium Severity
  • SRG-APP-000266

    Group
  • The container platform must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    The container platform is responsible for offering services to users. These services could be across diverse user groups and data types. To protect information about the container platform, service...
    Rule Medium Severity
  • SRG-APP-000290

    Group
  • The container platform must use cryptographic mechanisms to protect the integrity of audit tools.

    Protecting the integrity of the tools used for auditing purposes is a critical step to ensuring the integrity of audit data. Audit data includes all information (e.g., audit records, audit settings...
    Rule Medium Severity
  • SRG-APP-000291

    Group
  • The container platform must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are created.

    Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply ...
    Rule Medium Severity
  • SRG-APP-000292

    Group
  • The container platform must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are modified.

    When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes themselves. Sending notif...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules