No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000014-CTR-000035
Group -
OpenShift must use TLS 1.2 or greater for secure container image transport from trusted sources.
The authenticity and integrity of the container image during the container image lifecycle is part of the overall security posture of the container platform. This begins with the container image cr...Rule Medium Severity -
SRG-APP-000014-CTR-000040
Group -
OpenShift must use TLS 1.2 or greater for secure communication.
The authenticity and integrity of the container platform and communication between nodes and components must be secure. If an insecure protocol is used during transmission of data, the data can be ...Rule Medium Severity -
SRG-APP-000023-CTR-000055
Group -
OpenShift must use a centralized user management solution to support account management functions.
OpenShift supports several different types of identity providers. To add users and grant access to OpenShift, an identity provider must be configured. Some of the identity provider types such as HT...Rule Medium Severity -
SRG-APP-000023-CTR-000055
Group -
The kubeadmin account must be disabled.
Using a centralized user management solution for account management functions enhances security, simplifies administration, improves user experience, facilitates compliance, and provides scalabilit...Rule Medium Severity -
SRG-APP-000026-CTR-000070
Group -
OpenShift must automatically audit account creation.
Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to create a new a...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.