Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000099

    Group
  • All audit records must generate the event results within the container platform.

    Within the container platform, audit data can be generated from any of the deployed container platform components. This audit data is important when there are issues, such as security incidents, th...
    Rule Medium Severity
  • SRG-APP-000100

    Group
  • All audit records must identify any users associated with the event within the container platform.

    Without information that establishes the identity of the user associated with the events, security personnel cannot determine responsibility for the potentially harmful event.
    Rule Medium Severity
  • SRG-APP-000100

    Group
  • All audit records must identify any containers associated with the event within the container platform.

    Without information that establishes the identity of the containers offering user services or running on behalf of a user within the platform associated with audit events, security personnel cannot...
    Rule Medium Severity
  • SRG-APP-000101

    Group
  • The container platform must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.

    During an investigation of an incident, it is important to fully understand what took place. Often, information is not part of the audited event due to the data's nature, security risk, or audit lo...
    Rule Medium Severity
  • SRG-APP-000111

    Group
  • The container platform components must provide the ability to send audit logs to a central enterprise repository for review and analysis.

    The container platform components must send audit events to a central managed audit log repository to provide reporting, analysis, and alert notification. Incident response relies on successful tim...
    Rule Medium Severity
  • SRG-APP-000116

    Group
  • The container platform must use internal system clocks to generate audit record time stamps.

    Understanding when and sequence of events for an incident is crucial to understand what may have taken place. Without a common clock, the components generating audit events could be out of synchron...
    Rule Medium Severity
  • SRG-APP-000118

    Group
  • The container platform must protect audit information from any type of unauthorized read access.

    If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult if not impossible to achieve. In ad...
    Rule Medium Severity
  • SRG-APP-000119

    Group
  • The container platform must protect audit information from unauthorized modification.

    If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity would be impossible to achieve. To ensure the veracity of...
    Rule Medium Severity
  • SRG-APP-000120

    Group
  • The container platform must protect audit information from unauthorized deletion.

    If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity would be impossible to achieve. To ensure the veracity of...
    Rule Medium Severity
  • SRG-APP-000121

    Group
  • The container platform must protect audit tools from unauthorized access.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...
    Rule Medium Severity
  • SRG-APP-000122

    Group
  • The container platform must protect audit tools from unauthorized modification.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...
    Rule Medium Severity
  • SRG-APP-000123

    Group
  • The container platform must protect audit tools from unauthorized deletion.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...
    Rule Medium Severity
  • SRG-APP-000126

    Group
  • The container platform must use FIPS validated cryptographic mechanisms to protect the integrity of log information.

    To fully investigate an incident and to have trust in the audit data that is generated, it is important to put in place data protections. Without integrity protections, unauthorized changes may be ...
    Rule Medium Severity
  • SRG-APP-000131

    Group
  • The container platform must be built from verified packages.

    It is important to patch and upgrade the container platform when patches and upgrades are available. More important is to get these patches and upgrades from a known source. To validate the authent...
    Rule Medium Severity
  • SRG-APP-000131

    Group
  • The container platform must verify container images.

    The container platform must be capable of validating container images are signed and that the digital signature is from a recognized and approved source approved by the organization. Allowing any c...
    Rule Medium Severity
  • SRG-APP-000133

    Group
  • The container platform must limit privileges to the container platform registry.

    To control what is instantiated within the container platform, it is important to control access to the registry. Without this control, container images can be introduced and instantiated by accide...
    Rule Medium Severity
  • SRG-APP-000133

    Group
  • The container platform must limit privileges to the container platform runtime.

    To control what is instantiated within the container platform, it is important to control access to the runtime. Without this control, container platform specific services and customer services can...
    Rule Medium Severity
  • SRG-APP-000133

    Group
  • The container platform must limit privileges to the container platform keystore.

    The container platform keystore is used to store credentials used to build a trust between the container platform and some external source. This trust relationship is authorized by the organization...
    Rule Medium Severity
  • SRG-APP-000133

    Group
  • Configuration files for the container platform must be protected.

    The secure configuration of the container platform must be protected by disallowing changes to be implemented by non-privileged users. Changes to the container platform can introduce security risks...
    Rule Medium Severity
  • SRG-APP-000133

    Group
  • Authentication files for the container platform must be protected.

    The secure configuration of the container platform must be protected by disallowing changing to be implemented by non-privileged users. Changes to the container platform can introduce security risk...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • The container platform must be configured with only essential configurations.

    The container platform can be built with components that are not used for the intended purpose of the organization. To limit the attack surface of the container platform, it is essential that the n...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • The container platform registry must contain only container images for those capabilities being offered by the container platform.

    Allowing container images to reside within the container platform registry that are not essential to the capabilities being offered by the container platform becomes a potential security risk. By a...
    Rule Medium Severity
  • SRG-APP-000142

    Group
  • The container platform runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.

    Ports, protocols, and services within the container platform runtime must be controlled and conform to the PPSM CAL. Those ports, protocols, and services that fall outside the PPSM CAL must be bloc...
    Rule Medium Severity
  • SRG-APP-000142

    Group
  • The container platform runtime must enforce the use of ports that are non-privileged.

    Privileged ports are those ports below 1024 and that require system privileges for their use. If containers are able to use these ports, the container must be run as a privileged user. The containe...
    Rule Medium Severity
  • SRG-APP-000148

    Group
  • The container platform must uniquely identify and authenticate users.

    The container platform requires user accounts to perform container platform tasks. These tasks may pertain to the overall container platform or may be component-specific, thus requiring users to au...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules