Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516

    Group
  • Container platform components must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.

    Container platform components are part of the overall container platform, offering services that enable the container platform to fully orchestrate user containers. These components may fall outsid...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • The container platform must be able to store and instantiate industry standard container images.

    Monitoring the container images and containers during their lifecycle is important to guarantee the container platform is secure. To monitor the containers and images, security tools can be put in ...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • The container platform must continuously scan components, containers, and images for vulnerabilities.

    Finding vulnerabilities quickly within the container platform and within containers deployed within the platform is important to keep the overall platform secure. When a vulnerability within a comp...
    Rule Medium Severity
  • SRG-APP-000560

    Group
  • The container platform must prohibit communication using TLS versions 1.0 and 1.1, and SSL 2.0 and 3.0.

    The container platform and its components will prohibit the use of SSL and unauthorized versions of TLS protocols to properly secure communication. The use of unsupported protocol exposes vulnerab...
    Rule Medium Severity
  • SRG-APP-000605

    Group
  • The container platform must validate certificates used for Transport Layer Security (TLS) functions by performing an RFC 5280-compliant certification path validation.

    A certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make an informed d...
    Rule Medium Severity
  • SRG-APP-000610

    Group
  • The container platform must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).

    Without the use of digital signature, information can be altered by unauthorized accounts accessing or modifying the container platform registry, keystore, and container at runtime. Digital signatu...
    Rule Medium Severity
  • SRG-APP-000635

    Group
  • The container platform must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.

    Unvalidated cryptography is viewed by NIST as providing no protection to the information or data. In effect, the data would be considered unprotected plaintext. If the agency specifies that the inf...
    Rule High Severity
  • SRG-APP-000645

    Group
  • The container platform must prohibit or restrict the use of protocols that transmit unencrypted authentication information or use flawed cryptographic algorithms for transmission.

    The use of secure ports, protocols and services within the container platform must be controlled and conform to the PPSM CAL. Those ports, protocols, and services that fall outside the PPSM CAL mus...
    Rule High Severity
  • SRG-APP-000318

    Group
  • The container platform must enforce organization-defined circumstances and/or usage conditions for organization-defined accounts.

    Activity under unusual conditions can indicate hostile activity. For example, what is normal activity during business hours can indicate hostile activity if it occurs during off hours. Depending o...
    Rule Medium Severity
  • SRG-APP-000705

    Group
  • The container platform must disable accounts when the accounts are no longer associated to a user.

    Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality which reduce the attack surface of the system.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules