Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000246-CTR-000605

    Group
  • OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by rate-limiting.

    By setting rate limits, OpenShift can control the number of requests or connections allowed from a single source within a specific period. This prevents an excessive influx of requests that can ove...
    Rule Medium Severity
  • SRG-APP-000297-CTR-000705

    Group
  • OpenShift must display an explicit logout message indicating the reliable termination of authenticated communication sessions.

    The OpenShift CLI tool includes an explicit logout option. The web console's default logout will invalidate the user's session token and redirect back to the console page, which will redirect the...
    Rule Low Severity
  • SRG-APP-000342-CTR-000775

    Group
  • Container images instantiated by OpenShift must execute using least privileges.

    Container images running on OpenShift must support running as any arbitrary UID. OpenShift will then assign a random, nonprivileged UID to the running container instance. This avoids the risk from ...
    Rule High Severity
  • SRG-APP-000357-CTR-000800

    Group
  • Red Hat Enterprise Linux CoreOS (RHCOS) must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility.

    To ensure RHCOS has a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocate audit record storage capacity. The task of allocating audit record ...
    Rule Low Severity
  • SRG-APP-000360-CTR-000815

    Group
  • OpenShift must configure Alert Manger Receivers to notify SA and ISSO of all audit failure events requiring real-time alerts.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impe...
    Rule Medium Severity
  • SRG-APP-000381-CTR-000905

    Group
  • OpenShift must enforce access restrictions and support auditing of the enforcement actions.

    Enforcing access restrictions helps protect the OpenShift environment and its resources from unauthorized access, misuse, or malicious activities. By implementing access controls, OpenShift ensures...
    Rule Medium Severity
  • SRG-APP-000384-CTR-000915

    Group
  • OpenShift must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.

    Integrity of the OpenShift platform is handled by the cluster version operator. The cluster version operator will by default GPG verify the integrity of the release image before applying it. The re...
    Rule Medium Severity
  • SRG-APP-000400-CTR-000960

    Group
  • OpenShift must set server token max age no greater than eight hours.

    The setting for OAuth server token max age is used to control the maximum duration for which an issued OAuth access token remains valid. Access tokens serve as a form of authentication and authoriz...
    Rule Medium Severity
  • SRG-APP-000414-CTR-001010

    Group
  • Vulnerability scanning applications must implement privileged access authorization to all OpenShift components, containers, and container images for selected organization-defined vulnerability scanning activities.

    OpenShift uses service accounts to provide applications running on or off the platform access to the API service using the enforced RBAC policies. Vulnerability scanning applications that need acce...
    Rule Medium Severity
  • SRG-APP-000429-CTR-001060

    Group
  • OpenShift keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.

    By default, etcd data is not encrypted in OpenShift Container Platform. Enable etcd encryption for the cluster to provide an additional layer of data security. For example, it can help protect the ...
    Rule Medium Severity
  • SRG-APP-000435-CTR-001070

    Group
  • OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by employing organization-defined security safeguards by including a default resource quota.

    DNS attacks that are internal to the container platform (exploited or otherwise malicious applications) can have a limited blast radius by adhering to least privilege RBAC and Network access: https...
    Rule Medium Severity
  • SRG-APP-000435-CTR-001070

    Group
  • OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by defining resource quotas on a namespace.

    OpenShift allows administrators to define resource quotas on a namespace basis. This allows tailoring of the shared resources based on a project needs. However, when a new project is created, unles...
    Rule Medium Severity
  • SRG-APP-000439-CTR-001080

    Group
  • OpenShift must protect the confidentiality and integrity of transmitted information.

    OpenShift provides for two types of application level ingress types, Routes, and Ingresses. Routes have been a part of OpenShift since version 3. Ingresses were promoted out of beta in Aug 2020 (ku...
    Rule Medium Severity
  • SRG-APP-000450-CTR-001105

    Group
  • Red Hat Enterprise Linux CoreOS (RHCOS) must implement nonexecutable data to protect its memory from unauthorized code execution.

    The NX bit is a hardware feature that prevents the execution of code from data memory regions. By enabling NX bit execute protection, OpenShift ensures that malicious code or exploits cannot execut...
    Rule Medium Severity
  • SRG-APP-000450-CTR-001105

    Group
  • Red Hat Enterprise Linux CoreOS (RHCOS) must implement ASLR (Address Space Layout Randomization) from unauthorized code execution.

    ASLR is a security technique that randomizes the memory layout of processes, making it more difficult for attackers to predict the location of system components and exploit memory-based vulnerabili...
    Rule Medium Severity
  • SRG-APP-000454-CTR-001110

    Group
  • OpenShift must remove old components after updated versions have been installed.

    Previous versions of OpenShift components that are not removed from the container platform after updates have been installed may be exploited by adversaries by causing older components to execute w...
    Rule Medium Severity
  • SRG-APP-000456-CTR-001125

    Group
  • OpenShift must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs.

    It is critical to the security and stability of the container platform and the software services running on the platform to ensure that images are deployed through a trusted software supply chain. ...
    Rule Medium Severity
  • SRG-APP-000456-CTR-001130

    Group
  • OpenShift runtime must have updates installed within the period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    OpenShift runtime must be carefully monitored for vulnerabilities, and when problems are detected, they must be remediated quickly. A vulnerable runtime exposes all containers it supports, as well ...
    Rule Medium Severity
  • SRG-APP-000472-CTR-001170

    Group
  • The Compliance Operator must be configured.

    The Compliance Operator enables continuous compliance monitoring within OpenShift. It regularly assesses the environment against defined compliance policies and automatically detects and reports an...
    Rule Medium Severity
  • SRG-APP-000473-CTR-001175

    Group
  • OpenShift must perform verification of the correct operation of security functions: upon startup and/or restart; upon command by a user with privileged access; and/or every 30 days.

    Security functionality includes, but is not limited to, establishing system accounts, configuring access authorization (i.e., permissions, privileges), setting events to be audited, and setting int...
    Rule Medium Severity
  • SRG-APP-000495-CTR-001235

    Group
  • OpenShift must generate audit records when successful/unsuccessful attempts to modify privileges occur.

    Audit records provide a crucial source of information for security monitoring and incident response. By generating audit records for privilege modification attempts, OpenShift enables administrator...
    Rule Medium Severity
  • SRG-APP-000496-CTR-001240

    Group
  • OpenShift must generate audit records when successful/unsuccessful attempts to modify security objects occur.

    OpenShift and its components must generate audit records when modifying security objects. All the components must use the same standard so that the events can be tied together to understand what to...
    Rule Medium Severity
  • SRG-APP-000499-CTR-001255

    Group
  • OpenShift must generate audit records when successful/unsuccessful attempts to delete privileges occur.

    Audit records for unsuccessful attempts to delete privileges help in identifying unauthorized activities or potential attacks. If an unauthorized entity attempts to remove privileges, the audit rec...
    Rule Medium Severity
  • SRG-APP-000501-CTR-001265

    Group
  • OpenShift must generate audit records when successful/unsuccessful attempts to delete security objects occur.

    By generating audit records for security object deletions, OpenShift enables administrators and security teams to track and investigate any unauthorized or suspicious removal of security objects. T...
    Rule Medium Severity
  • SRG-APP-000503-CTR-001275

    Group
  • OpenShift must generate audit records when successful/unsuccessful logon attempts occur.

    Audit records provide valuable information for security monitoring and intrusion detection. By generating audit logs for logon attempts, OpenShift enables administrators and security teams to track...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules