Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000173

    Group
  • The container platform must enforce 24 hours (one day) as the minimum password lifetime.

    Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. Restricting this setting limits the user's ability to...
    Rule Medium Severity
  • SRG-APP-000174

    Group
  • The container platform must enforce a 60-day maximum password lifetime restriction.

    Any password, no matter how complex, can eventually be cracked; therefore, passwords need to be changed at specific intervals. One method of minimizing this risk is to use complex passwords and p...
    Rule Medium Severity
  • SRG-APP-000177

    Group
  • The container platform must map the authenticated identity to the individual user or group account for PKI-based authentication.

    The container platform and its components may require authentication before use. When the authentication is PKI-based, the container platform or component must map the certificate to a user account...
    Rule Medium Severity
  • SRG-APP-000178

    Group
  • The container platform must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    To prevent the compromise of authentication information such as passwords during the authentication process, the feedback from the container platform and its components, e.g., runtime, registry, an...
    Rule Medium Severity
  • SRG-APP-000181

    Group
  • The container platform must provide an audit reduction capability that supports on-demand reporting requirements.

    The ability to generate on-demand reports, including after the audit data has been subjected to audit reduction, greatly facilitates the organization's ability to generate incident reports as neede...
    Rule Medium Severity
  • SRG-APP-000185

    Group
  • The container platform must employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions.

    If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the system. The act of managing systems and applications includes the ability to...
    Rule Medium Severity
  • SRG-APP-000190

    Group
  • The application must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity
  • SRG-APP-000211

    Group
  • The container platform must separate user functionality (including user interface services) from information system management functionality.

    Separating user functionality from management functionality is a requirement for all the components within the container platform. Without the separation, users may have access to management functi...
    Rule Medium Severity
  • SRG-APP-000219

    Group
  • The container platform must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.

    The container platform is responsible for pulling images from trusted sources and placing those images into its registry. To protect the transmission of images, the container platform must use FIPS...
    Rule High Severity
  • SRG-APP-000225

    Group
  • The container platform runtime must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

    The container platform offers services for container image orchestration and services for users. If any of these services were to fail into an insecure state, security measures for user and data se...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules