Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000014

    Group
  • The container platform must use TLS 1.2 or greater for secure container image transport from trusted sources.

    The authenticity and integrity of the container image during the container image lifecycle is part of the overall security posture of the container platform. This begins with the container image cr...
    Rule Medium Severity
  • SRG-APP-000014

    Group
  • The container platform must use TLS 1.2 or greater for secure communication.

    The authenticity and integrity of the container platform and communication between nodes and components must be secure. If an insecure protocol is used during transmission of data, the data can be ...
    Rule Medium Severity
  • SRG-APP-000023

    Group
  • The container platform must use a centralized user management solution to support account management functions.

    Enterprise environments make application account management challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other error. A comp...
    Rule Medium Severity
  • SRG-APP-000024

    Group
  • The container platform must automatically remove or disable temporary user accounts after 72 hours.

    If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To mitigate this risk, automated termination of al...
    Rule Medium Severity
  • SRG-APP-000025

    Group
  • The container platform must automatically disable accounts after a 35-day period of account inactivity.

    Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. Owners of inactive accounts will not notice if unauthorized access to...
    Rule Medium Severity
  • SRG-APP-000026

    Group
  • The container platform must automatically audit account creation.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to create a new ...
    Rule Medium Severity
  • SRG-APP-000027

    Group
  • The container platform must automatically audit account modification.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to modify an exi...
    Rule Medium Severity
  • SRG-APP-000028

    Group
  • The container platform must automatically audit account-disabling actions.

    When application accounts are disabled, user accessibility is affected. Once an attacker establishes access to an application, the attacker often attempts to disable authorized accounts to disrupt ...
    Rule Medium Severity
  • SRG-APP-000029

    Group
  • The container platform must automatically audit account removal actions.

    When application accounts are removed, user accessibility is affected. Once an attacker establishes access to an application, the attacker often attempts to remove authorized accounts to disrupt se...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • Least privilege access and need to know must be required to access the container platform registry.

    The container platform registry is used to store images and is the keeper of truth for trusted images within the platform. To guarantee the images integrity, access to the registry must be limited ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules