Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000380

    Group
  • The container platform must enforce access restrictions for container platform configuration changes.

    Configuration changes cause the container platform to change the way it operates. These changes can be used to improve the system with added features or performance, but these configuration changes...
    Rule Medium Severity
  • SRG-APP-000381

    Group
  • The container platform must enforce access restrictions and support auditing of the enforcement actions.

    Auditing the enforcement of access restrictions against changes to the container platform helps identify attacks and provides forensic data for investigation for after-the-fact actions. Attempts to...
    Rule Medium Severity
  • SRG-APP-000383

    Group
  • All non-essential, unnecessary, and unsecure DoD ports, protocols, and services must be disabled in the container platform.

    To properly offer services to the user and to orchestrate containers, the container platform may offer services that use ports and protocols that best fit those services. The container platform, wh...
    Rule Medium Severity
  • SRG-APP-000384

    Group
  • The container platform must prevent component execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage.

    The container platform may offer components such as DNS services, firewall services, router services, or web services that are not required by every organization to meet their needs. Container plat...
    Rule Medium Severity
  • SRG-APP-000386

    Group
  • The container platform registry must employ a deny-all, permit-by-exception (whitelist) policy to allow only authorized container images in the container platform.

    Controlling the sources where container images can be pulled from allows the organization to define what software can be run within the container platform. Allowing any container image to be introd...
    Rule Medium Severity
  • SRG-APP-000389

    Group
  • The container platform must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    Controlling user access is paramount in securing the container platform. During a user's access to the container platform, events may occur that change the user's access and which require reauthent...
    Rule Medium Severity
  • SRG-APP-000391

    Group
  • The container platform must be configured to use multi-factor authentication for user authentication.

    Controlling access to the container platform and its components is paramount in having a secure and stable system. Validating users is the first step in controlling the access. Users may be validat...
    Rule Medium Severity
  • SRG-APP-000400

    Group
  • The container platform must prohibit the use of cached authenticators after an organization-defined time period.

    If cached authentication information is out of date, the validity of the authentication information may be questionable.
    Rule Medium Severity
  • SRG-APP-000401

    Group
  • The container platform, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

    The potential of allowing access to users who are no longer authorized (have revoked certificates) increases unless a local cache of revocation data is configured.
    Rule Medium Severity
  • SRG-APP-000402

    Group
  • The container platform must accept Personal Identity Verification (PIV) credentials from other federal agencies.

    Controlling access to the container platform and its components is paramount in having a secure and stable system. Validating users is the first step in controlling the access. Users may be validat...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules