Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000118-CTR-000240

    Group
  • OpenShift must protect log directory from any type of unauthorized access by setting file permissions.

    Log files contain sensitive information such as user credentials, system configurations, and potentially even security-related events. Unauthorized access to log files can expose this sensitive dat...
    Rule Medium Severity
  • SRG-APP-000118-CTR-000240

    Group
  • OpenShift must protect log directory from any type of unauthorized access by setting owner permissions.

    OpenShift follows the principle of least privilege, which aims to restrict access to resources based on user roles and responsibilities. This separation of privileges helps mitigate the risk of una...
    Rule Medium Severity
  • SRG-APP-000118-CTR-000240

    Group
  • OpenShift must protect pod log files from any type of unauthorized access by setting owner permissions.

    Pod log files may contain sensitive information such as application data, user credentials, or system configurations. Unauthorized access to these log files can expose sensitive data to malicious a...
    Rule Medium Severity
  • SRG-APP-000119-CTR-000245

    Group
  • OpenShift must protect audit information from unauthorized modification.

    If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult if not impossible to achieve. In ad...
    Rule Medium Severity
  • SRG-APP-000121-CTR-000255

    Group
  • OpenShift must prevent unauthorized changes to logon UIDs.

    Logon UIDs are used to uniquely identify and authenticate users within the system. By preventing unauthorized changes to logon UIDs, OpenShift ensures that user identities remain consistent and acc...
    Rule Medium Severity
  • SRG-APP-000121-CTR-000255

    Group
  • OpenShift must protect audit tools from unauthorized access.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...
    Rule Medium Severity
  • SRG-APP-000126-CTR-000275

    Group
  • OpenShift must use FIPS-validated cryptographic mechanisms to protect the integrity of log information.

    To fully investigate an incident and to have trust in the audit data that is generated, it is important to put in place data protections. Without integrity protections, unauthorized changes may be ...
    Rule Medium Severity
  • SRG-APP-000131-CTR-000285

    Group
  • OpenShift must verify container images.

    The container platform must be capable of validating that container images are signed and that the digital signature is from a recognized and source approved by the organization. Allowing any conta...
    Rule Medium Severity
  • SRG-APP-000141-CTR-000320

    Group
  • OpenShift must contain only container images for those capabilities being offered by the container platform.

    Allowing container images to reside within the container platform registry that are not essential to the capabilities being offered by the container platform becomes a potential security risk. By a...
    Rule Medium Severity
  • SRG-APP-000142-CTR-000325

    Group
  • OpenShift runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.

    OpenShift Container Platform uses several IPV4 and IPV6 ports and protocols to facilitate cluster communication and coordination. Not all these ports are identified and approved by the PPSM CAL. Th...
    Rule Medium Severity
  • SRG-APP-000148-CTR-000335

    Group
  • OpenShift must disable root and terminate network connections.

    Direct login as the "root" user must be disabled to prevent unrestricted access and control over the entire system. Terminating an idle session within a short time reduces the window of opportuni...
    Rule High Severity
  • SRG-APP-000149-CTR-000355

    Group
  • OpenShift must use multifactor authentication for network access to accounts.

    Without the use of multifactor authentication, the ease of access to privileged and nonprivileged functions is greatly increased. Multifactor authentication requires using two or more factors to a...
    Rule Medium Severity
  • SRG-APP-000156-CTR-000380

    Group
  • OpenShift must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.

    A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...
    Rule Medium Severity
  • SRG-APP-000172-CTR-000440

    Group
  • OpenShift must use FIPS validated LDAP or OpenIDConnect.

    Passwords need to be protected on entry, in transmission, during authentication, and when stored. If compromised at any of these security points, a nefarious user can use the password along with st...
    Rule High Severity
  • SRG-APP-000190-CTR-000500

    Group
  • OpenShift must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.

    In OpenShift, the "session token inactivity timeout" on OAuth clients is set to ensure security and protect against potential unauthorized access to user sessions. OAuth is an open standard for sec...
    Rule Medium Severity
  • SRG-APP-000211-CTR-000530

    Group
  • OpenShift must separate user functionality (including user interface services) from information system management functionality.

    Red Hat Enterprise Linux CoreOS (RHCOS) is a single-purpose container operating system. RHCOS is only supported as a component of the OpenShift Container Platform. Remote management of the RHCOS no...
    Rule Medium Severity
  • SRG-APP-000219-CTR-000550

    Group
  • OpenShift must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 validated cryptography.

    FIPS compliance is one of the most critical components required in highly secure environments, to ensure that only supported cryptographic technologies are allowed on nodes. Because FIPS must be e...
    Rule High Severity
  • SRG-APP-000233-CTR-000585

    Group
  • OpenShift runtime must isolate security functions from nonsecurity functions.

    An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Security functions are the hardware, software, and/...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    Group
  • OpenShift must prevent unauthorized and unintended information transfer via shared system resources and enable page poisoning.

    Enabling page poisoning in OpenShift improves memory safety, mitigates memory corruption vulnerabilities, aids in fault isolation, assists with debugging. It enhances the overall security and stabi...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    Group
  • OpenShift must disable virtual syscalls.

    Virtual syscalls are a mechanism that allows user-space programs to make privileged system calls without transitioning to kernel mode. However, this feature can introduce additional security risks....
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    Group
  • OpenShift must enable poisoning of SLUB/SLAB objects.

    By enabling poisoning of SLUB/SLAB objects, OpenShift can detect and identify use-after-free scenarios more effectively. The poisoned objects are marked as invalid or inaccessible, causing crashes ...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    Group
  • OpenShift must set the sticky bit for world-writable directories.

    Removing world-writable permissions or setting the sticky bit helps enforce access control on directories within the OpenShift platform. World-writable permissions allow any user to modify or delet...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    Group
  • OpenShift must restrict access to the kernel buffer.

    Restricting access to the kernel buffer in OpenShift is crucial for preventing unauthorized access, protecting system stability, mitigating kernel-level attacks, preventing information leakage, and...
    Rule Medium Severity
  • SRG-APP-000243-CTR-000600

    Group
  • OpenShift must prevent kernel profiling.

    Kernel profiling involves monitoring and analyzing the behavior of the kernel, including its internal operations and system calls. This level of access and visibility into the kernel can potentiall...
    Rule Medium Severity
  • SRG-APP-000246-CTR-000605

    Group
  • OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by setting a default Resource Quota.

    OpenShift allows administrators to define resource quotas on a namespace basis. This allows tailoring of the shared resources based on a project needs. However, when a new project is created, unles...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules