Container Platform Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +2
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 2
- V-233108 Medium The application must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity;
- V-233224 Medium The application must protect the confidentiality and integrity of transmitted information.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-APP-000014-CTR-000035
- Vuln IDs
-
- V-233015
- Rule IDs
-
- SV-233015r600534_rule
Checks: C-35951r600532_chk
Review the container platform configuration to verify that TLS 1.2 or greater is being used for secure container image transport from trusted sources. If TLS 1.2 or greater is not being used for secure container image transport, this is a finding.
Fix: F-35919r600533_fix
Configure the container platform to use TLS 1.2 or greater when components communicate internally or externally. The fix ensures that all communication components in the container platform are configured to utilize secure versions of TLS.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-APP-000014-CTR-000040
- Vuln IDs
-
- V-233016
- Rule IDs
-
- SV-233016r600537_rule
Checks: C-35952r600535_chk
Review the container platform configuration to verify that TLS 1.2 or greater is being used for communication by the container platform nodes and components. If TLS 1.2 or greater is not being used for secure communication, this is a finding.
Fix: F-35920r600536_fix
Configure the container platform to use TLS 1.2 or greater for node and component communication.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000023-CTR-000055
- Vuln IDs
-
- V-233019
- Rule IDs
-
- SV-233019r600546_rule
Checks: C-35955r600544_chk
Review the container platform to determine if it is using a centralized user management system for user management functions. If the container platform is not using a centralized user management system for user management functions, this is a finding.
Fix: F-35923r600545_fix
Configure the container platform to use a centralized user management system for user management functions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-CTR-000060
- Vuln IDs
-
- V-233020
- Rule IDs
-
- SV-233020r600549_rule
Checks: C-35956r600547_chk
Review the container platform configuration to determine if temporary user accounts are automatically removed or disabled after 72 hours. If temporary user accounts are not automatically removed or disabled after 72 hours, this is a finding.
Fix: F-35924r600548_fix
Configure the container platform to automatically remove or disable temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- SRG-APP-000025-CTR-000065
- Vuln IDs
-
- V-233021
- Rule IDs
-
- SV-233021r601890_rule
Checks: C-35957r601888_chk
Determine if the container platform automatically disables accounts after a 35-day period of account inactivity. If the container platform does not automatically disable accounts after a 35-day period of account inactivity, this is a finding.
Fix: F-35925r601889_fix
Configure the container platform to automatically disable accounts after a 35-day period of account inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-CTR-000070
- Vuln IDs
-
- V-233022
- Rule IDs
-
- SV-233022r600555_rule
Checks: C-35958r600553_chk
Review the container platform configuration to determine if audit records are automatically created upon account creation. If audit records are not automatically created upon account creation, this is a finding.
Fix: F-35926r600554_fix
Configure the container platform to automatically create audit records on account creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-CTR-000075
- Vuln IDs
-
- V-233023
- Rule IDs
-
- SV-233023r600558_rule
Checks: C-35959r600556_chk
Review the container platform configuration to determine if account modification is automatically audited. If account modification is not automatically audited, this is a finding.
Fix: F-35927r600557_fix
Configure the container platform to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-CTR-000080
- Vuln IDs
-
- V-233024
- Rule IDs
-
- SV-233024r600561_rule
Checks: C-35960r600559_chk
Review the container platform configuration to determine if account disabling is automatically audited. If account disabling is not automatically audited, this is a finding.
Fix: F-35928r600560_fix
Configure the container platform to automatically audit account disabling.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-CTR-000085
- Vuln IDs
-
- V-233025
- Rule IDs
-
- SV-233025r600564_rule
Checks: C-35961r600562_chk
Review the container platform configuration to determine if account removal is automatically audited. If account removal is not automatically audited, this is a finding.
Fix: F-35929r600563_fix
Configure the container platform to automatically audit account removal.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-CTR-000090
- Vuln IDs
-
- V-233026
- Rule IDs
-
- SV-233026r601603_rule
Checks: C-35962r601602_chk
Review the container platform configuration to determine if least privilege and need-to-know access is being used for container platform registry access. If least privilege and need-to-know access is not being used for container platform registry access, this is a finding.
Fix: F-35930r600566_fix
Configure the container platform to use least privilege and need to know when granting access to the container platform registry. The fix ensures the proper roles and permissions are configured.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-CTR-000095
- Vuln IDs
-
- V-233027
- Rule IDs
-
- SV-233027r600570_rule
Checks: C-35963r600568_chk
Review the container platform to determine if only those individuals with runtime duties have access to the container platform runtime. If users have access to the container platform runtime that do not have runtime duties, this is a finding.
Fix: F-35931r600569_fix
Configure the container platform to use least privilege and need to know when granting access to the container runtime. The fix ensures the proper roles and permissions are configured.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-CTR-000100
- Vuln IDs
-
- V-233028
- Rule IDs
-
- SV-233028r600573_rule
Checks: C-35964r600571_chk
Review the container platform to determine if only those individuals with keystore duties have access to the container platform keystore. If users have access to the container platform keystore that do not have keystore duties, this is a finding.
Fix: F-35932r600572_fix
Configure the container platform to use least privilege and need to know when granting access to the container keystore. The fix ensures the proper roles and permissions are configured.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-APP-000038-CTR-000105
- Vuln IDs
-
- V-233029
- Rule IDs
-
- SV-233029r601605_rule
Checks: C-35965r601604_chk
Review the container platform to determine if approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies is being enforced. If the organization-defined information flow policies are not being enforced, this is a finding.
Fix: F-35933r600575_fix
Configure the container platform to enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-APP-000039-CTR-000110
- Vuln IDs
-
- V-233030
- Rule IDs
-
- SV-233030r600579_rule
Checks: C-35966r600577_chk
Review the container platform configuration to determine if organization-defined information flow controls are implemented. If information flow controls are not implemented, this is a finding.
Fix: F-35934r600578_fix
Configure the container platform to implement organization-defined information flow controls.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-CTR-000115
- Vuln IDs
-
- V-233031
- Rule IDs
-
- SV-233031r601607_rule
Checks: C-35967r601606_chk
Review the container platform to determine if it is configured to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. If the container platform is not configured to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period, this is a finding.
Fix: F-35935r600581_fix
Configure the container platform to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- SRG-APP-000068-CTR-000120
- Vuln IDs
-
- V-233032
- Rule IDs
-
- SV-233032r601609_rule
Checks: C-35968r601608_chk
Review the container platform configuration to determine if the Standard Mandatory DoD Notice and Consent Banner is configured to be displayed before granting access to platform components. Log in to the container platform components and verify that the Standard Mandatory DoD Notice and Consent Banner is being displayed before granting access. If the Standard Mandatory DoD Notice and Consent Banner is not configured or is not displayed before granting access to container platform components, this is a finding.
Fix: F-35936r600584_fix
Configure the container platform to display the Standard Mandatory DoD Notice and Consent Banner before granting access to container platform components.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000050
- Version
- SRG-APP-000069-CTR-000125
- Vuln IDs
-
- V-233033
- Rule IDs
-
- SV-233033r601611_rule
Checks: C-35969r601610_chk
Log in to the container platform components to determine if the Standard Mandatory DoD Notice and Consent Banner remains on the screen until users acknowledge the usage and conditions and take explicit actions to log on for further access. If the Standard Mandatory DoD Notice and Consent Banner does not stay on the screen until the users acknowledge the usage and conditions, this is a finding.
Fix: F-35937r600587_fix
Configure the container platform to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage and conditions and take explicit actions to log on for further access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-CTR-000150
- Vuln IDs
-
- V-233038
- Rule IDs
-
- SV-233038r601613_rule
Checks: C-35974r601612_chk
Review the container platform configuration to determine if the container platform is configured to generate audit records for all DoD-defined auditable events within all components in the platform. Generate DoD-defined auditable events within all the components to determine if the events are being audited. If the container platform is not configured to generate audit records for all DoD-defined auditable events within the components or the events are not generating audit records, this is a finding.
Fix: F-35942r600602_fix
Configure the container platform to generate audit records for all DoD-defined auditable events within all the components of the container platform.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-APP-000090-CTR-000155
- Vuln IDs
-
- V-233039
- Rule IDs
-
- SV-233039r601615_rule
Checks: C-35975r601614_chk
Review the container platform to determine if the container platform is configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. If the container platform is not configured to only allow the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited, this is a finding.
Fix: F-35943r600605_fix
Configure the container platform to only allow the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-CTR-000160
- Vuln IDs
-
- V-233040
- Rule IDs
-
- SV-233040r601617_rule
Checks: C-35976r601616_chk
Review the container platform configuration to determine if it is configured to generate audit records when successful/unsuccessful attempts are made to access privileges. If the container platform is not configured to generate audit records on successful/unsuccessful access to privileges, this is a finding.
Fix: F-35944r600608_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts are made to access privileges occur.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-CTR-000165
- Vuln IDs
-
- V-233041
- Rule IDs
-
- SV-233041r601871_rule
Checks: C-35977r601870_chk
Review the container platform configuration for session audits. Ensure audit policy for session logging at startup is enabled. Verify events are written to the log. Validate system documentation is current. If the container platform is not configured to meet this requirement, this is a finding.
Fix: F-35945r600611_fix
Configure the container platform to generate audit logs for session logging at startup. Revise all applicable system documentation.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-CTR-000170
- Vuln IDs
-
- V-233042
- Rule IDs
-
- SV-233042r601621_rule
Checks: C-35978r601620_chk
Review the container platform configuration for audit event types. Ensure audit policy for event type is enabled. Verify records showing what type of event occurred are written to the log. Validate system documentation is current. If log data does not show the type of event, this is a finding.
Fix: F-35946r600614_fix
Configure the container platform to include the event type in the log data. Revise all applicable system documentation.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-CTR-000175
- Vuln IDs
-
- V-233043
- Rule IDs
-
- SV-233043r601623_rule
Checks: C-35979r601622_chk
Review the container platform configuration for audit events date and time. Ensure audit policy for event date and time are enabled. Verify records showing event date and time are included in the log. Validate system documentation is current. If the date and time are not included, this is a finding.
Fix: F-35947r600617_fix
Configure the container platform to include log date and time with the event. Revise all applicable system documentation.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-CTR-000180
- Vuln IDs
-
- V-233044
- Rule IDs
-
- SV-233044r601625_rule
Checks: C-35980r601624_chk
Review the container platform configuration to determine if all audit records identify where in the container platform the event occurred. Generate audit records and view the audit records to verify that the records do identify where in the container platform the event occurred. If the container platform is not configured to generate audit records that identify where in the container platform the event occurred, or if the generated audit records do not identify where in the container platform the event occurred, this is a finding.
Fix: F-35948r600620_fix
Configure the container platform to generate audit records that identify where in the container platform the event occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-CTR-000185
- Vuln IDs
-
- V-233045
- Rule IDs
-
- SV-233045r601627_rule
Checks: C-35981r601626_chk
Review container platform audit policy configuration for logons establishing the sources of events. Ensure audit policy is configured to generate sufficient information to resolve the source, e.g., source IP, of the log event. Verify records showing by requesting a user access the container platform and generate log events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-35949r600623_fix
Configure the container platform registry, keystore, and runtime to generate the source of each loggable event. Revise all applicable system documentation.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-CTR-000190
- Vuln IDs
-
- V-233046
- Rule IDs
-
- SV-233046r601629_rule
Checks: C-35982r601628_chk
Review the container platform configuration to determine if audit records contain the audit event results. Generate audit records and review the data to validate that the record does contain the event result. If the container platform is not configured to generate audit records with the event result or the audit record does not contain the event result, this is a finding.
Fix: F-35950r600626_fix
Configure the container platform to generate audit records that contain the event result.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-CTR-000195
- Vuln IDs
-
- V-233047
- Rule IDs
-
- SV-233047r601631_rule
Checks: C-35983r601630_chk
Review container platform documentation and the log files on the application server to determine if the logs contain information that establishes the identity of the user or process associated with log event data. If the container platform does not produce logs that establish the identity of the user or process associated with log event data, this is a finding.
Fix: F-35951r600629_fix
Configure the container platform logging system to log the identity of the user or process related to the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-CTR-000200
- Vuln IDs
-
- V-233048
- Rule IDs
-
- SV-233048r601633_rule
Checks: C-35984r601632_chk
Review the container platform configuration to determine if it is configured to generate audit records that contain the component information that generated the audit record. Generate audit records and review the data to determine if records are generated containing the component information that generated the record. If the container platform is not configured to generate audit records containing the component information or records are generated that do not contain the component information that generated the record, this is a finding.
Fix: F-35952r600632_fix
Configure the container platform to include the component information that generated the audit record.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-CTR-000205
- Vuln IDs
-
- V-233049
- Rule IDs
-
- SV-233049r601635_rule
Checks: C-35985r601634_chk
Review the documentation and deployment configuration to determine if the container platform is configured to generate full-text recording of privileged commands or the individual identities of group users at a minimum. Have a user execute a privileged command and review the log data to validate that the full-text or identity of the individual is being logged. If the container platform is not meeting this requirement, this is a finding.
Fix: F-35953r600635_fix
Configure the container platform to generate the full-text recording of privileged commands, or the individual identities of group users, or both.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-CTR-000215
- Vuln IDs
-
- V-233051
- Rule IDs
-
- SV-233051r601637_rule
Checks: C-35987r601636_chk
Review the configuration settings to determine how the container platform components are configured for audit failures. When the audit failure is due to the lack of audit record storage, the container platform must continue generating audit records, restarting services if necessary, and overwrite the oldest audit records in a first-in-first-out manner. If the audit failure is due to a communication to a centralized collection server, the container platform must queue audit records locally until communication is restored or the records are retrieved manually. If the container platform is not configured to handle audit failures appropriately, this is a finding.
Fix: F-35955r601861_fix
Configure the container platform to continue generating audit records overwriting oldest audit records in a first-in-first-out manner when the failure is due to a lack of audit record storage. When the audit failure is due to a communication to a centralized collection server, configure the container platform to queue audit records locally until communication is restored or the records are retrieved manually. If other actions are to be taken for audit record failures, the actions and rationale must be documented in the system security plan and risk acceptance approvals must be obtained.
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- SRG-APP-000111-CTR-000220
- Vuln IDs
-
- V-233052
- Rule IDs
-
- SV-233052r601639_rule
Checks: C-35988r601638_chk
Review the configuration settings to determine if the container platform components are configured to send audit events to central managed audit log repository. If the container platform is not configured to send audit events to central managed audit log repository, this is a finding.
Fix: F-35956r600644_fix
Configure the container platform components to send audit logs to a central managed audit log repository.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-CTR-000235
- Vuln IDs
-
- V-233055
- Rule IDs
-
- SV-233055r600654_rule
Checks: C-35991r600652_chk
Review the container platform configuration files to determine if the internal system clock is used for time stamps. If the container platform does not use the internal system clock to generate time stamps, this is a finding.
Fix: F-35959r600653_fix
Configure the container platform to use internal system clocks to generate time stamps for log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-CTR-000240
- Vuln IDs
-
- V-233056
- Rule IDs
-
- SV-233056r600657_rule
Checks: C-35992r600655_chk
Review the container platform configuration to determine where audit information is stored. If the audit information is not protected from any type of unauthorized read access, this is a finding.
Fix: F-35960r600656_fix
Configure the container platform to protect the storage of audit information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-CTR-000245
- Vuln IDs
-
- V-233057
- Rule IDs
-
- SV-233057r600660_rule
Checks: C-35993r600658_chk
Review the container platform configuration to determine where audit information is stored. If the audit log data is not protected from unauthorized modification, this is a finding.
Fix: F-35961r600659_fix
Configure the container platform to protect the storage of audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-CTR-000250
- Vuln IDs
-
- V-233058
- Rule IDs
-
- SV-233058r600663_rule
Checks: C-35994r600661_chk
Review the container platform configuration to determine where audit information is stored. If the audit log data is not protected from unauthorized deletion, this is a finding.
Fix: F-35962r600662_fix
Configure the container platform to protect the storage of audit information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-CTR-000255
- Vuln IDs
-
- V-233059
- Rule IDs
-
- SV-233059r600666_rule
Checks: C-35995r600664_chk
Review the container platform to validate container platform audit tools are protected from unauthorized access. If the audit tools are not protected from unauthorized access, this is a finding.
Fix: F-35963r600665_fix
Configure the container platform to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-CTR-000260
- Vuln IDs
-
- V-233060
- Rule IDs
-
- SV-233060r600669_rule
Checks: C-35996r600667_chk
Review the container platform to validate container platform audit tools are protected from unauthorized modification. If the audit tools are not protected from unauthorized modification, this is a finding.
Fix: F-35964r600668_fix
Configure the container platform to protect audit tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-CTR-000265
- Vuln IDs
-
- V-233061
- Rule IDs
-
- SV-233061r600672_rule
Checks: C-35997r600670_chk
Review the container platform to validate container platform audit tools are protected from unauthorized deletion. If the audit tools are not protected from unauthorized deletion, this is a finding.
Fix: F-35965r600671_fix
Configure the container platform to protect audit tools from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001350
- Version
- SRG-APP-000126-CTR-000275
- Vuln IDs
-
- V-233063
- Rule IDs
-
- SV-233063r601693_rule
Checks: C-35999r601673_chk
Review the container platform configuration to determine if FIPS-validated cryptographic mechanisms are being used to protect the integrity of log information. If FIPS-validated cryptographic mechanisms are not being used to protect the integrity of log information, this is a finding.
Fix: F-35967r600677_fix
Configure the container platform to use FIPS-validated cryptographic mechanisms to protect the integrity of log information.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-CTR-000280
- Vuln IDs
-
- V-233064
- Rule IDs
-
- SV-233064r601695_rule
Checks: C-36000r601694_chk
Review the container platform configuration to verify it has been built from packages that are digitally signed by known and approved sources. If the container platform was built from packages that are not digitally signed or are from unknown or non-approved sources, this is a finding.
Fix: F-35968r600680_fix
Rebuild the container platform from verified packages that are digitally signed by known and approved sources.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-CTR-000285
- Vuln IDs
-
- V-233065
- Rule IDs
-
- SV-233065r601697_rule
Checks: C-36001r601696_chk
Review the container platform configuration to determine if container images are verified by enforcing image signing and that the image is signed recognized by an approved source. If container images are not verified or the signature is not verified as a recognized and approved source, this is a finding.
Fix: F-35969r600683_fix
Configure the container platform to verify container images are digitally signed and the signature is from a recognized and approved source.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-CTR-000290
- Vuln IDs
-
- V-233066
- Rule IDs
-
- SV-233066r601699_rule
Checks: C-36002r601872_chk
Review the container platform registry configuration to determine if the level of access to the registry is controlled through user privileges. Attempt to perform registry operations to determine if the privileges are enforced. If the container platform registry is not limited through user privileges or the user privileges are not enforced, this is a finding.
Fix: F-35970r600686_fix
Configure the container platform to use and enforce user privileges when accessing the container platform registry.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-CTR-000295
- Vuln IDs
-
- V-233067
- Rule IDs
-
- SV-233067r601701_rule
Checks: C-36003r601700_chk
Review the container platform runtime configuration to determine if the level of access to the runtime is controlled through user privileges. Attempt to perform runtime operations to determine if the privileges are enforced. If the container platform runtime is not limited through user privileges or the user privileges are not enforced, this is a finding.
Fix: F-35971r600689_fix
Configure the container platform to use and enforce user privileges when accessing the container platform runtime.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-CTR-000300
- Vuln IDs
-
- V-233068
- Rule IDs
-
- SV-233068r601703_rule
Checks: C-36004r601873_chk
Review the container platform keystore configuration to determine if the level of access to the keystore is controlled through user privileges. Attempt to perform keystore operations to determine if the privileges are enforced. If the container platform keystore is not limited through user privileges or the user privileges are not enforced, this is a finding.
Fix: F-35972r600692_fix
Configure the container platform to use and enforce user privileges when accessing the container platform keystore.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-CTR-000305
- Vuln IDs
-
- V-233069
- Rule IDs
-
- SV-233069r600696_rule
Checks: C-36005r600694_chk
Review the container platform to verify that configuration files cannot be modified by non-privileged users. If non-privileged users can modify configuration files, this is a finding.
Fix: F-35973r600695_fix
Configure the container platform to only allow configuration modifications by privileged users.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-CTR-000310
- Vuln IDs
-
- V-233070
- Rule IDs
-
- SV-233070r600699_rule
Checks: C-36006r600697_chk
Review the container platform to verify that authentication files cannot be modified by non-privileged users. If non-privileged users can modify key and certificate files, this is a finding.
Fix: F-35974r600698_fix
Configure the container platform to only allow authentication file modifications by privileged users.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-CTR-000315
- Vuln IDs
-
- V-233071
- Rule IDs
-
- SV-233071r600702_rule
Checks: C-36007r600700_chk
Review the container platform configuration and verify that only those components needed for operation are installed. If components are installed that are not used for the intended purpose of the organization, this is a finding.
Fix: F-35975r600701_fix
Identify the role the container platform is intended to play in the production environment and remove any components that are not needed or used for the intended purpose.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-CTR-000320
- Vuln IDs
-
- V-233072
- Rule IDs
-
- SV-233072r600705_rule
Checks: C-36008r600703_chk
Review the container platform registry and the container images being stored. If container images are stored in the registry and are not being used to offer container platform capabilities, this is a finding.
Fix: F-35976r600704_fix
Remove all container images from the container platform registry that are not being used or contain features and functions not supported by the platform.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-CTR-000325
- Vuln IDs
-
- V-233073
- Rule IDs
-
- SV-233073r601892_rule
Checks: C-36009r601891_chk
Review the container platform documentation and deployment configuration to determine which ports and protocols are enabled. Verify the ports and protocols being used are not prohibited by PPSM CAL in accordance to DoD Instruction 8551.01 Policy and are necessary for the operations and applications. If any of the ports or protocols is prohibited or not necessary for the operation, this is a finding.
Fix: F-35977r600707_fix
Configure the container platform to disable any ports or protocols that are prohibited by the PPSM CAL and not necessary for the operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-CTR-000330
- Vuln IDs
-
- V-233074
- Rule IDs
-
- SV-233074r601707_rule
Checks: C-36010r601706_chk
Review the container platform configuration and the containers within the platform by performing the following checks: 1. Verify the container platform is configured to disallow the use of privileged ports by containers. 2. Validate all containers within the container platform are using non-privileged ports. 3. Attempt to instantiate a container image that uses a privileged port. If the container platform is not configured to disallow the use of privileged ports, this is a finding. If the container platform has containers using privileged ports, this is a finding. If the container platform allows containers to be instantiated that use privileged ports, this is a finding.
Fix: F-35978r600710_fix
Configure the container platform to disallow the use of privileged ports by containers. Move any containers that are using privileged ports to non-privileged ports.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-CTR-000335
- Vuln IDs
-
- V-233075
- Rule IDs
-
- SV-233075r600714_rule
Checks: C-36011r600712_chk
Review the container platform configuration to determine if users are uniquely identified and authenticated. If users are not uniquely identified or are not authenticated, this is a finding.
Fix: F-35979r600713_fix
Configure the container platform to uniquely identify and authenticate users.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-CTR-000340
- Vuln IDs
-
- V-233076
- Rule IDs
-
- SV-233076r600717_rule
Checks: C-36012r600715_chk
Review the container platform configuration to determine if users are uniquely identified and authenticated before the API is executed. If users are not uniquely identified or are not authenticated, this is a finding.
Fix: F-35980r600716_fix
Configure the container platform to uniquely identify and authenticate users before container platform API access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-CTR-000345
- Vuln IDs
-
- V-233077
- Rule IDs
-
- SV-233077r600720_rule
Checks: C-36013r600718_chk
Review the container platform configuration to determine if processes acting on behalf of users are uniquely identified and authenticated. If processes acting on behalf of users are not uniquely identified or are not authenticated, this is a finding.
Fix: F-35981r600719_fix
Configure the container platform to uniquely identify and authenticate processes acting on behalf of users.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-CTR-000350
- Vuln IDs
-
- V-233078
- Rule IDs
-
- SV-233078r601709_rule
Checks: C-36014r601708_chk
Review the container platform API configuration to determine if processes acting on behalf of users are uniquely identified and authenticated. If processes acting on behalf of users are not uniquely identified or are not authenticated, this is a finding.
Fix: F-35982r600722_fix
Configure the container platform API to uniquely identify and authenticate processes acting on behalf of users.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-CTR-000355
- Vuln IDs
-
- V-233079
- Rule IDs
-
- SV-233079r601711_rule
Checks: C-36015r601710_chk
Review the container platform configuration to determine if the container platform is configured to use multifactor authentication for network access to privileged accounts. If the container platform does not use multifactor authentication for network access to privileged accounts, this is a finding.
Fix: F-35983r600725_fix
Configure the container platform to use multifactor authentication for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000150-CTR-000360
- Vuln IDs
-
- V-233080
- Rule IDs
-
- SV-233080r601713_rule
Checks: C-36016r601712_chk
Review the container platform configuration to determine if the container platform is configured to use multifactor authentication for network access to non-privileged accounts. If the container platform does not use multifactor authentication for network access to non-privileged accounts, this is a finding.
Fix: F-35984r600728_fix
Configure the container platform to use multifactor authentication for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- SRG-APP-000151-CTR-000365
- Vuln IDs
-
- V-233081
- Rule IDs
-
- SV-233081r600732_rule
Checks: C-36017r600730_chk
Review the container platform configuration to determine if multifactor authentication is used for local access to privileged accounts. If multifactor authentication for local access to privileged accounts is not being used, this is a finding.
Fix: F-35985r600731_fix
Configure the container platform to use multifactor authentication for local access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000768
- Version
- SRG-APP-000152-CTR-000370
- Vuln IDs
-
- V-233082
- Rule IDs
-
- SV-233082r600735_rule
Checks: C-36018r600733_chk
Review the container platform configuration to determine if multifactor authentication is used for local access to non-privileged accounts. If multifactor authentication for local access to non-privileged accounts is not being used, this is a finding.
Fix: F-35986r600734_fix
Configure the container platform to use multifactor authentication for local access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- SRG-APP-000153-CTR-000375
- Vuln IDs
-
- V-233083
- Rule IDs
-
- SV-233083r601715_rule
Checks: C-36019r601714_chk
Review the container platform configuration to determine if the container platform is configured to ensure users are authenticated with an individual authenticator prior to using a group authenticator. If the container platform is not configured to ensure users are authenticated with an individual authenticator prior to using a group authenticator, this is a finding.
Fix: F-35987r600737_fix
Configure the container platform to ensure users are authenticated with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000156-CTR-000380
- Vuln IDs
-
- V-233084
- Rule IDs
-
- SV-233084r601717_rule
Checks: C-36020r601716_chk
Review the container platform configuration to determine if the container platform is configured to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts. If the container platform is not configured to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts, this is a finding.
Fix: F-35988r600740_fix
Configure the container platform to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001942
- Version
- SRG-APP-000157-CTR-000385
- Vuln IDs
-
- V-233085
- Rule IDs
-
- SV-233085r601719_rule
Checks: C-36021r601718_chk
Review the container platform configuration to determine if the container platform is configured to provide replay-resistant authentication mechanisms for network access to non-privileged accounts. If the container platform is not configured to provide replay-resistant authentication mechanisms for network access to non-privileged accounts, this is a finding.
Fix: F-35989r600743_fix
Configure the container platform to provide replay-resistant authentication mechanisms for network access to non-privileged accounts.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-APP-000158-CTR-000390
- Vuln IDs
-
- V-233086
- Rule IDs
-
- SV-233086r601721_rule
Checks: C-36022r601720_chk
Review the container platform configuration to determine if the container platform uniquely identifies all nodes before establishing a connection. If the container platform is not configured to uniquely identify all nodes before establishing the connection, this is a finding.
Fix: F-35990r600746_fix
Configure the container platform to uniquely identify all nodes before establishing the connection.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- SRG-APP-000163-CTR-000395
- Vuln IDs
-
- V-233087
- Rule IDs
-
- SV-233087r601723_rule
Checks: C-36023r601722_chk
Review the container platform configuration to determine if the container platform is configured to disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. If identifiers are not disabled after 35 days of inactivity, this is a finding.
Fix: F-35991r600749_fix
Configure the container platform to disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SRG-APP-000164-CTR-000400
- Vuln IDs
-
- V-233088
- Rule IDs
-
- SV-233088r600753_rule
Checks: C-36024r600751_chk
Review the container platform configuration to determine if the container platform enforces a minimum 15-character password length. If the container platform does not enforce a 15-character password length, this is a finding.
Fix: F-35992r600752_fix
Configure the container platform to enforce a minimum 15-character password length.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- SRG-APP-000165-CTR-000405
- Vuln IDs
-
- V-233089
- Rule IDs
-
- SV-233089r600756_rule
Checks: C-36025r600754_chk
Review the container platform configuration to determine if it prohibits password reuse for a minimum of five generations. If the container platform does not prohibit password reuse for a minimum of five generations, this is a finding.
Fix: F-35993r600755_fix
Configure the container platform to prohibit password reuse for a minimum of five generations.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- SRG-APP-000166-CTR-000410
- Vuln IDs
-
- V-233090
- Rule IDs
-
- SV-233090r601725_rule
Checks: C-36026r601724_chk
Review the container platform configuration to determine if it enforces password complexity by requiring that at least one uppercase character be used. If the container platform does not enforce password complexity by requiring that at least one uppercase character be used, this is a finding.
Fix: F-35994r600758_fix
Configure the container platform to enforce password complexity by requiring that at least one uppercase character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- SRG-APP-000167-CTR-000415
- Vuln IDs
-
- V-233091
- Rule IDs
-
- SV-233091r601727_rule
Checks: C-36027r601726_chk
Review the container platform configuration to determine if it enforces password complexity by requiring that at least one lowercase character be used. If the container platform does not enforce password complexity by requiring that at least one lowercase character be used, this is a finding.
Fix: F-35995r600761_fix
Configure the container platform to enforce password complexity by requiring that at least one lowercase character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- SRG-APP-000168-CTR-000420
- Vuln IDs
-
- V-233092
- Rule IDs
-
- SV-233092r601729_rule
Checks: C-36028r601728_chk
Review the container platform configuration to determine if it enforces password complexity by requiring that at least one numeric character be used. If the container platform does not enforce password complexity by requiring that at least one numeric character be used, this is a finding.
Fix: F-35996r600764_fix
Configure the container platform to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- SRG-APP-000169-CTR-000425
- Vuln IDs
-
- V-233093
- Rule IDs
-
- SV-233093r601731_rule
Checks: C-36029r601730_chk
Review the container platform configuration to determine if it enforces password complexity by requiring that at least one special character be used. If the container platform does not enforce password complexity by requiring that at least one special character be used, this is a finding.
Fix: F-35997r600767_fix
Configure the container platform to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- SRG-APP-000170-CTR-000430
- Vuln IDs
-
- V-233094
- Rule IDs
-
- SV-233094r601733_rule
Checks: C-36030r601732_chk
Review the container platform configuration to determine if it requires the change of at least 15 of the total number of characters when passwords are changed. If the container platform does not require the change of at least 15 of the total number of characters when passwords are changed, this is a finding.
Fix: F-35998r600770_fix
Configure the container platform to require the change of at least 15 of the total number of characters when passwords are changed.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- SRG-APP-000171-CTR-000435
- Vuln IDs
-
- V-233095
- Rule IDs
-
- SV-233095r601735_rule
Checks: C-36031r601734_chk
Review the container platform configuration to determine if it using password authentication and stores only cryptographic representations of the passwords. If the container platform is using password authentication and does not store only cryptographic representations of passwords, this is a finding.
Fix: F-35999r600773_fix
Configure the container platform to store only cryptographic representations of passwords if passwords are being used for authentication.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-APP-000172-CTR-000440
- Vuln IDs
-
- V-233096
- Rule IDs
-
- SV-233096r600777_rule
Checks: C-36032r600775_chk
Review the documentation and configuration to determine if the container platform enforces the required FIPS-validated encrypt passwords when they are transmitted. If the container platform is not configured to meet this requirement, this is a finding.
Fix: F-36000r600776_fix
Configure the container platform to transmit only encrypted FIPS-validated SHA-2 or later representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- SRG-APP-000173-CTR-000445
- Vuln IDs
-
- V-233097
- Rule IDs
-
- SV-233097r600780_rule
Checks: C-36033r600778_chk
Review the container platform configuration to determine if it enforces 24 hours/1 day as the minimum password lifetime. If the container platform does not enforce 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-36001r600779_fix
Configure the container platform to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- SRG-APP-000174-CTR-000450
- Vuln IDs
-
- V-233098
- Rule IDs
-
- SV-233098r600783_rule
Checks: C-36034r600781_chk
Review the container platform configuration to determine if it enforces a 60-day maximum password lifetime restriction. If the container platform does not enforce a 60-day maximum password lifetime restriction, this is a finding.
Fix: F-36002r600782_fix
Configure the container platform to enforce a 60-day maximum password lifetime restriction.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-CTR-000465
- Vuln IDs
-
- V-233101
- Rule IDs
-
- SV-233101r600792_rule
Checks: C-36037r600790_chk
Review documentation and configuration to ensure the container platform provides a PKI integration capability that meets DoD PKI infrastructure requirements. If the container platform is not configured to meet this requirement, this is a finding.
Fix: F-36005r600791_fix
Configure the container platform to utilize the DoD Enterprise PKI infrastructure.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- SRG-APP-000178-CTR-000470
- Vuln IDs
-
- V-233102
- Rule IDs
-
- SV-233102r601737_rule
Checks: C-36038r601736_chk
Review container platform documentation and configuration to determine if any interfaces that are provided for authentication purposes display the user's password when it is typed into the data entry field. If authentication information is not obfuscated when entered, this is a finding.
Fix: F-36006r600794_fix
Configure the container platform to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-APP-000181-CTR-000485
- Vuln IDs
-
- V-233105
- Rule IDs
-
- SV-233105r601739_rule
Checks: C-36041r601738_chk
Review the container platform configuration to determine if the container platform is configured to provide an audit reduction capability that supports on-demand reporting requirements. If the container platform is not configured to support on-demand reporting requirements, this is a finding.
Fix: F-36009r600803_fix
Configure the container platform to support on-demand reporting requirements.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- SRG-APP-000185-CTR-000490
- Vuln IDs
-
- V-233106
- Rule IDs
-
- SV-233106r601741_rule
Checks: C-36042r601740_chk
Review the container platform configuration to determine if the container platform is configured to employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions. If the container platform is not configured to employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions, this is a finding.
Fix: F-36010r600806_fix
Configure the container platform to employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SRG-APP-000190-CTR-000500
- Vuln IDs
-
- V-233108
- Rule IDs
-
- SV-233108r754792_rule
Checks: C-36044r600811_chk
This requirement is NA for this technology.
Fix: F-36012r600812_fix
The requirement is NA. No fix is required.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-CTR-000530
- Vuln IDs
-
- V-233114
- Rule IDs
-
- SV-233114r601743_rule
Checks: C-36050r601742_chk
Review the container platform configuration to determine if management functionality is separated from user functionality. Validate that the separation is also implemented within the components by trying to execute management functions for each component as a user. If the container platform is not configured to separate management and user functionality or if component management and user functionality are not separated, this is a finding.
Fix: F-36018r600830_fix
Configure the container platform and its components to separate management and user functionality.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001184
- Version
- SRG-APP-000219-CTR-000550
- Vuln IDs
-
- V-233118
- Rule IDs
-
- SV-233118r601745_rule
Checks: C-36054r601744_chk
Review the container platform configuration to determine if FIPS-validated 140-2 or 140-3 cryptographic modules are being used to protect container images during transmission. If FIPS-validated 140-2 or 140-3 cryptographic modules are not being use, this is a finding.
Fix: F-36022r600842_fix
Configure the container platform to use FIPS-validated 140-2 or 140-3 cryptographic modules to protect container images during transmission.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-CTR-000570
- Vuln IDs
-
- V-233122
- Rule IDs
-
- SV-233122r601749_rule
Checks: C-36058r601746_chk
Review documentation and configuration to determine if the container platform runtime fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If the container platform runtime cannot be configured to fail securely, this is a finding.
Fix: F-36026r600854_fix
Configure the container platform runtime to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-APP-000226-CTR-000575
- Vuln IDs
-
- V-233123
- Rule IDs
-
- SV-233123r600858_rule
Checks: C-36059r600856_chk
Review the container platform configuration to determine if information necessary to determine the cause of a disruption or failure is preserved. If the information is not preserved, this is a finding.
Fix: F-36027r600857_fix
Configure the container platform to preserve information necessary to determine the cause of the disruption or failure.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-APP-000233-CTR-000585
- Vuln IDs
-
- V-233125
- Rule IDs
-
- SV-233125r601751_rule
Checks: C-36061r601750_chk
Verify container platform runtime configuration settings to determine whether container services used for security functions are located in an isolated security function such as a separate environment variables, labels, network segregation, and kernel groups. If security-related functions are not separate, this is a finding.
Fix: F-36029r600863_fix
Configure the container platform runtime to isolate security functions from non-security functions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-APP-000234-CTR-000590
- Vuln IDs
-
- V-233126
- Rule IDs
-
- SV-233126r600867_rule
Checks: C-36062r600865_chk
Review the container platform to determine if emergency accounts are automatically removed or disabled. If emergency accounts are automatically removed or disabled, this is a finding.
Fix: F-36030r600866_fix
Configure the container platform to never remove or disable emergency accounts.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-APP-000243-CTR-000595
- Vuln IDs
-
- V-233127
- Rule IDs
-
- SV-233127r601753_rule
Checks: C-36063r601752_chk
Review documentation and configuration to determine if the container platform disallows instantiation of containers trying to access host system privileged resources. If the container platform does not block containers requesting host system privileged resources, this is a finding.
Fix: F-36031r600869_fix
Configure the container platform to block instantiation of containers requesting access to host system-privileged resources.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-APP-000243-CTR-000600
- Vuln IDs
-
- V-233128
- Rule IDs
-
- SV-233128r601755_rule
Checks: C-36064r601754_chk
Review the container platform architecture documentation to find out if and how it protects the resources of one process or user (such as working memory, storage, host system kernel, network connections) from unauthorized access by another user or process. If the container platform configuration settings do not effectively implement these protections to prevent unauthorized access by another user or process, this is a finding.
Fix: F-36032r601862_fix
Deploy a container platform capable of effectively protecting the resources of one process or user from unauthorized access by another user or process. Configure the container platform to effectively protect the resources of one process or user from unauthorized access by another user or process. The container security solution should help the user understand where the code in the environment was deployed from, and provide controls that prevent deployment from untrusted sources or registries.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-APP-000246-CTR-000605
- Vuln IDs
-
- V-233129
- Rule IDs
-
- SV-233129r601757_rule
Checks: C-36065r601756_chk
Review the container platform implementation and security documentation and components settings to determine if the information system restricts the ability of users or systems to launch organization-defined DoS attacks against other information systems or networks from the container platform. If the container platform is not configured to restrict this ability, this is a finding.
Fix: F-36033r600875_fix
Configure the container platform to restrict the ability of users or other systems to launch DoS attacks from the container platform components by setting resource quotas on resources such as memory, storage, and CPU utilization.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-CTR-000625
- Vuln IDs
-
- V-233133
- Rule IDs
-
- SV-233133r601759_rule
Checks: C-36069r601758_chk
Review documentation and logs to determine if the container platform writes sensitive information such as passwords or private keys into the logs and administrative messages. If the container platform writes sensitive or potentially harmful information into the logs and administrative messages, this is a finding.
Fix: F-36037r600887_fix
Configure the container platform to not write sensitive information into the logs and administrative messages.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001496
- Version
- SRG-APP-000290-CTR-000670
- Vuln IDs
-
- V-233142
- Rule IDs
-
- SV-233142r600915_rule
Checks: C-36078r600913_chk
Review the container platform configuration to determine if the integrity of the audit tools is protected using cryptographic mechanisms. If audit tools are not protected through cryptographic mechanisms, this is a finding.
Fix: F-36046r600914_fix
Configure the container platform to use cryptographic mechanisms to protect the integrity of audit tools.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001683
- Version
- SRG-APP-000291-CTR-000675
- Vuln IDs
-
- V-233143
- Rule IDs
-
- SV-233143r600918_rule
Checks: C-36079r600916_chk
Review the container platform configuration to determine if system administrators and ISSO are notified when accounts are created. If system administrators and ISSO are not notified, this is a finding.
Fix: F-36047r600917_fix
Configure the container platform to notify system administrators and ISSO when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001684
- Version
- SRG-APP-000292-CTR-000680
- Vuln IDs
-
- V-233144
- Rule IDs
-
- SV-233144r600921_rule
Checks: C-36080r600919_chk
Review the container platform configuration to determine if system administrators and ISSO are notified when accounts are modified. If system administrators and ISSO are not notified, this is a finding.
Fix: F-36048r600920_fix
Configure the container platform to notify system administrators and ISSO when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001685
- Version
- SRG-APP-000293-CTR-000685
- Vuln IDs
-
- V-233145
- Rule IDs
-
- SV-233145r600924_rule
Checks: C-36081r600922_chk
Review the container platform configuration to determine if system administrators and ISSO are notified when accounts are disabled. If system administrators and ISSO are not notified, this is a finding.
Fix: F-36049r600923_fix
Configure the container platform to notify system administrators and ISSO when accounts are disabled.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001686
- Version
- SRG-APP-000294-CTR-000690
- Vuln IDs
-
- V-233146
- Rule IDs
-
- SV-233146r600927_rule
Checks: C-36082r600925_chk
Review the container platform configuration to determine if system administrators and ISSO are notified when accounts are removed. If system administrators and ISSO are not notified, this is a finding.
Fix: F-36050r600926_fix
Configure the container platform to notify system administrators and ISSO when accounts are removed.
- RMF Control
- AC-12
- Severity
- L
- CCI
- CCI-002364
- Version
- SRG-APP-000297-CTR-000705
- Vuln IDs
-
- V-233149
- Rule IDs
-
- SV-233149r600936_rule
Checks: C-36085r600934_chk
Review documentation and configuration settings to determine if the container platform displays a logout message. If the container platform does not display a logout message, this is a finding.
Fix: F-36053r600935_fix
Configure the container platform components to display an explicit logout message to users.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002142
- Version
- SRG-APP-000317-CTR-000735
- Vuln IDs
-
- V-233155
- Rule IDs
-
- SV-233155r600954_rule
Checks: C-36091r600952_chk
Determine if the container platform is configured to terminate shared/group account credentials when members leave the group. If the container platform does not terminated shared/group account credentials when members leave the group, this is a finding.
Fix: F-36059r600953_fix
Configure the container platform to terminate shared/group account credentials when members leave the group.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002145
- Version
- SRG-APP-000318-CTR-000740
- Vuln IDs
-
- V-233156
- Rule IDs
-
- SV-233156r601761_rule
Checks: C-36092r601760_chk
Determine if the container platform is configured to enforce organization-defined circumstances and/or usage conditions for organization-defined accounts. If the container platform does not enforce organization-defined circumstances and/or usage conditions for organization-defined accounts, this is a finding.
Fix: F-36060r600956_fix
Configure the container platform to enforce organization-defined circumstances and/or usage conditions for organization-defined accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-APP-000319-CTR-000745
- Vuln IDs
-
- V-233157
- Rule IDs
-
- SV-233157r600960_rule
Checks: C-36093r600958_chk
Determine if the container platform is configured to automatically audit account-enabling actions. If the container platform is not configured to automatically audit account-enabling actions, this is a finding.
Fix: F-36061r600959_fix
Configure the container platform to automatically audit account-enabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- SRG-APP-000320-CTR-000750
- Vuln IDs
-
- V-233158
- Rule IDs
-
- SV-233158r600963_rule
Checks: C-36094r600961_chk
Determine if the container platform is configured to notify system administrator and ISSO of account enabling actions. If the container platform is not configured to notify system administrator and ISSO of account enabling actions, this is a finding.
Fix: F-36062r600962_fix
Configure the container platform to notify system administrator and ISSO of account enabling actions.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-CTR-000770
- Vuln IDs
-
- V-233162
- Rule IDs
-
- SV-233162r601763_rule
Checks: C-36098r601762_chk
Review documentation to obtain the definition of the container platform functionality considered privileged in the context of the information system in question. Review the container platform security configuration and/or other means used to protect privileged functionality from unauthorized use. If the configuration does not protect all of the actions defined as privileged, this is a finding.
Fix: F-36066r600974_fix
Configure the container platform to security to protect all privileged functionality. Assigning roles that limit what actions a particular user can perform are the most common means of meeting this requirement.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- SRG-APP-000342-CTR-000775
- Vuln IDs
-
- V-233163
- Rule IDs
-
- SV-233163r601765_rule
Checks: C-36099r601764_chk
Review documentation and configuration to determine if the container platform disallows instantiation of containers trying to execute with more privileges than required or with privileged permissions. If the container platform does not block containers requesting privileged permissions, privilege escalation, or allows containers to have more privileges than required, this is a finding.
Fix: F-36067r600977_fix
Configure the container platform to block instantiation with no more privileges than necessary.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-APP-000343-CTR-000780
- Vuln IDs
-
- V-233164
- Rule IDs
-
- SV-233164r600981_rule
Checks: C-36100r600979_chk
Review container platform documentation and log configuration to verify the application server logs privileged activity. If the container platform is not configured to log privileged activity, this is a finding.
Fix: F-36068r600980_fix
Configure the container platform to log privileged activity.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-CTR-000785
- Vuln IDs
-
- V-233165
- Rule IDs
-
- SV-233165r601767_rule
Checks: C-36101r601766_chk
Determine if the container platform is configured to automatically lock an account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded. If the container platform is not configured to lock the account, this is a finding.
Fix: F-36069r600983_fix
Configure the container platform to automatically lock an account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-CTR-000790
- Vuln IDs
-
- V-233166
- Rule IDs
-
- SV-233166r601869_rule
Checks: C-36102r601768_chk
Review documentation and configuration setting. If the container platform does not provide the ability for users in authorized roles to reconfigure auditing at any time of the user's choosing, this is a finding. If changes in audit configuration cannot take effect until after a certain time or date, or until some event, such as a server restart, has occurred, and if that time or event does not meet the requirements specified by the organization, this is a finding.
Fix: F-36070r601868_fix
Deploy a container platform that provides the ability for users in authorized roles to reconfigure auditing at any time. Deploy a container platform that allows audit configuration changes to take effect within the timeframe required by the organization and without involving actions or events that the organization rules unacceptable.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-CTR-000800
- Vuln IDs
-
- V-233168
- Rule IDs
-
- SV-233168r601782_rule
Checks: C-36104r601781_chk
Review the container platform configuration to determine if audit record storage capacity is allocated in accordance with organization-defined audit record storage requirements. If audit record storage capacity is not allocated in accordance with organization-defined audit record storage requirements, this is a finding.
Fix: F-36072r600992_fix
Configure the container platform to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-CTR-000805
- Vuln IDs
-
- V-233169
- Rule IDs
-
- SV-233169r601784_rule
Checks: C-36105r601783_chk
Verify the log records are being off-loaded to a separate system or transferred from the container platform storage location to a storage location other than the container platform itself. The information system may demonstrate this capability using a log management application, system configuration, or other means. If logs are not being off-loaded, this is a finding.
Fix: F-36073r600995_fix
Configure the container platform to off-load the logs to a remote log or management server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-CTR-000810
- Vuln IDs
-
- V-233170
- Rule IDs
-
- SV-233170r601786_rule
Checks: C-36106r601785_chk
Review the container platform configuration to determine if it is configured to provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity. If the container platform is not configured to provide an immediate real-time alert, this is a finding.
Fix: F-36074r600998_fix
Configure the container platform to provide an immediate real-time alert to the SA and ISSO when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-CTR-000815
- Vuln IDs
-
- V-233171
- Rule IDs
-
- SV-233171r601788_rule
Checks: C-36107r601787_chk
Review the container platform configuration to determine if it is configured to provide an immediate real-time alert to the SA and ISSO of all audit failure events requiring real-time alerts. If the container platform is not configured to provide an immediate real-time alert, this is a finding.
Fix: F-36075r601001_fix
Configure the container platform to provide an immediate real-time alert to the SA and ISSO of all audit failure events requiring real-time alerts.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-CTR-000865
- Vuln IDs
-
- V-233181
- Rule IDs
-
- SV-233181r601032_rule
Checks: C-36117r601030_chk
Review the container platform documentation and configuration files to determine if time stamps for log records can be mapped to UTC or GMT or local time that offsets from UTC. If the time stamp cannot be mapped to UTC or GMT, this is a finding.
Fix: F-36085r601031_fix
Configure the container platform to use UTC or GMT or local time that offset from UTC based time stamps for log records.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-CTR-000870
- Vuln IDs
-
- V-233182
- Rule IDs
-
- SV-233182r601035_rule
Checks: C-36118r601033_chk
Review the container platform documentation and configuration files to determine if time stamps for log records meet a granularity of one second. If the time stamp cannot generate to a one-second granularity, this is a finding.
Fix: F-36086r601034_fix
Configure the container platform to use time stamps for log records that can meet a granularity of one second.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- SRG-APP-000378-CTR-000880
- Vuln IDs
-
- V-233184
- Rule IDs
-
- SV-233184r601790_rule
Checks: C-36120r601789_chk
Review the container platform configuration to determine if patches and updates can only be installed through accounts with privileged status. Attempt to install a patch or upgrade using a non-privileged user account. If patches or updates can be installed using a non-privileged account or the container platform is not configured to stop the installation using a non-privileged account, this is a finding.
Fix: F-36088r601040_fix
Configure the container platform to only allow patch installation and upgrades using privileged accounts.
- RMF Control
- CM-11
- Severity
- H
- CCI
- CCI-001812
- Version
- SRG-APP-000378-CTR-000885
- Vuln IDs
-
- V-233185
- Rule IDs
-
- SV-233185r601792_rule
Checks: C-36121r601791_chk
Review the container platform runtime configuration to determine if only accounts given specific container instantiation privileges can execute the container image instantiation process. Attempt to instantiate a container image using an account that does not have the proper privileges to execute the process. If container images can be instantiated using an account without the proper privileges, this is a finding.
Fix: F-36089r601043_fix
Configure the container platform runtime to prohibit the instantiation of container images without explicit container image instantiation privileges given to users.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- SRG-APP-000378-CTR-000890
- Vuln IDs
-
- V-233186
- Rule IDs
-
- SV-233186r601047_rule
Checks: C-36122r601045_chk
Review container platform registry security settings with respect to non-administrative users' ability to create, alter, or replace container images. If any such permissions exist and are not documented and approved, this is a finding.
Fix: F-36090r601046_fix
Document and obtain approval for any non-administrative users who require the ability to create, alter, or replace container images within the container platform registry. Implement the approved permissions. Revoke any unapproved permissions.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-CTR-000900
- Vuln IDs
-
- V-233188
- Rule IDs
-
- SV-233188r601881_rule
Checks: C-36124r601793_chk
Review documentation and configuration settings to determine if the container platform enforces access restrictions associated with changes to container platform components configuration. If the container platform does not enforce such access restrictions, this is a finding.
Fix: F-36092r601880_fix
Configure the container platform to enforce access restrictions associated with changes to the container platform components configuration.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- SRG-APP-000381-CTR-000905
- Vuln IDs
-
- V-233189
- Rule IDs
-
- SV-233189r601056_rule
Checks: C-36125r601054_chk
Review container platform documentation and logs to determine if enforcement actions used to restrict access associated with changes to the container platform are logged. If these actions are not logged, this is a finding.
Fix: F-36093r601055_fix
Configure the container platform to log the enforcement actions used to restrict access associated with changes.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- SRG-APP-000383-CTR-000910
- Vuln IDs
-
- V-233190
- Rule IDs
-
- SV-233190r601059_rule
Checks: C-36126r601057_chk
Review the container platform configuration to determine if services or capabilities presently on the information system are required for operational or mission needs. If additional services or capabilities are present on the system, this is a finding.
Fix: F-36094r601058_fix
Configure the container platform to only utilize secure ports and protocols required for operation that have been accepted for use as per the Ports, Protocols, and Services Category Assignments List (CAL) from DISA (PPSM).
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- SRG-APP-000384-CTR-000915
- Vuln IDs
-
- V-233191
- Rule IDs
-
- SV-233191r601796_rule
Checks: C-36127r601795_chk
Review documentation and configuration setting to determine if policies, rules, or restrictions exist regarding usage of container platform components. If no such no restrictions are in place, this is not a finding. Identify any components the organization requires to be disabled or removed and configure the container platform according to that policy. If the container platform components are not disabled or removed according to the organization's policy, this is a finding.
Fix: F-36095r601061_fix
Configure the container platform so that any platform components that are not required in order to meet the organization's mission are disabled or removed. Document the components that must be disabled or removed for reference.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001774
- Version
- SRG-APP-000386-CTR-000920
- Vuln IDs
-
- V-233192
- Rule IDs
-
- SV-233192r601798_rule
Checks: C-36128r601797_chk
Review documentation and configuration settings to identify if the container platform whitelisting specifies which container platform components are allowed to execute. Check for the existence of policy settings or policy files that can be configured to restrict container platform component execution. Demonstrate how the program execution is restricted. Look for a deny-all, permit-by-exception policy of restriction. Some methods for restricting execution include but are not limited to the use of custom capabilities built into the application or Software Restriction Policies, Application Security Manager, or Role-Based Access Controls (RBAC). If container platform whitelisting is not utilized or does not follow a deny-all, permit-by-exception (whitelist) policy, this is a finding.
Fix: F-36096r601064_fix
Configure the container platform to utilize a deny-all, permit-by-exception policy when allowing the execution of authorized software.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-APP-000389-CTR-000925
- Vuln IDs
-
- V-233193
- Rule IDs
-
- SV-233193r601068_rule
Checks: C-36129r601066_chk
Review documentation and configuration to determine if the container platform requires a user to reauthenticate when organization-defined circumstances or situations are met. If the container platform does not meet this requirement, this is a finding.
Fix: F-36097r601067_fix
Configure the container platform to require a user to reauthenticate when organization-defined circumstances or situations are met.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002039
- Version
- SRG-APP-000390-CTR-000930
- Vuln IDs
-
- V-233194
- Rule IDs
-
- SV-233194r601800_rule
Checks: C-36130r601799_chk
Review documentation and configuration to determine if the container platform requires devices to reauthenticate when organization-defined circumstances or situations require reauthentication. If the container platform does not require a device to reauthenticate, this is a finding.
Fix: F-36098r601070_fix
Configure the container platform to require devices to reauthenticate when organization-defined circumstances or situations require reauthentication.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-CTR-000935
- Vuln IDs
-
- V-233195
- Rule IDs
-
- SV-233195r601074_rule
Checks: C-36131r601072_chk
Review documentation and configuration to ensure the container platform is configured to use an approved DoD multifactor token (CAC) when accessing platform via user interfaces. If multifactor authentication is not configured, this is a finding.
Fix: F-36099r601073_fix
Configure the container platform to accept standard DoD multifactor token-based credentials when users interface with the platform.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-APP-000397-CTR-000955
- Vuln IDs
-
- V-233199
- Rule IDs
-
- SV-233199r601802_rule
Checks: C-36135r601801_chk
Review the container platform configuration to determine if the platform is configured to allow the use of a temporary password for system logons with an immediate change to a permanent password. If the container platform is not configured to allow temporary passwords with immediate change to a permanent password, this is a finding.
Fix: F-36103r601085_fix
Configure the container platform to allow the use of a temporary password for system logons with an immediate change to a permanent password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-CTR-000960
- Vuln IDs
-
- V-233200
- Rule IDs
-
- SV-233200r601804_rule
Checks: C-36136r601803_chk
Review the container platform configuration to determine if the platform is configured to prohibit the use of cached authenticators after an organization-defined time period. If the container platform is not configured to prohibit the use of cached authenticators after an organization-defined time period, this is a finding.
Fix: F-36104r601088_fix
Configure the container platform to prohibit the use of cached authenticators after an organization-defined time period.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001991
- Version
- SRG-APP-000401-CTR-000965
- Vuln IDs
-
- V-233201
- Rule IDs
-
- SV-233201r601806_rule
Checks: C-36137r601805_chk
Review the container platform configuration. If the container platform is not implemented to use a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network, this is a finding.
Fix: F-36105r601091_fix
Configure the container platform to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002009
- Version
- SRG-APP-000402-CTR-000970
- Vuln IDs
-
- V-233202
- Rule IDs
-
- SV-233202r601095_rule
Checks: C-36138r601093_chk
Review the documentation and configuration to determine if the container platform accepts PIV credentials from other federal agencies. If the container platform does not accept other federal agency PIV credentials, this is a finding.
Fix: F-36106r601094_fix
Configure the container platform to accept PIV credentials from other federal agencies.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- SRG-APP-000409-CTR-000990
- Vuln IDs
-
- V-233206
- Rule IDs
-
- SV-233206r601808_rule
Checks: C-36142r601807_chk
Review the container platform to verify if the platform is auditing non-local maintenance and diagnostic sessions' organization-defined audit events. If the container platform is not auditing non-local maintenance and diagnostic sessions' organization-defined audit events, this is a finding.
Fix: F-36110r601106_fix
Configure the container platform to audit non-local maintenance and diagnostic sessions' organization-defined audit events.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- SRG-APP-000411-CTR-000995
- Vuln IDs
-
- V-233207
- Rule IDs
-
- SV-233207r601874_rule
Checks: C-36143r601809_chk
Validate that container platform applications and APIs used for nonlocal maintenance sessions are using FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications. If the sessions are not using FIPS-validated HMAC, this is a finding.
Fix: F-36111r601109_fix
Configure the container platform applications and APIs used for nonlocal maintenance sessions to use FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-003123
- Version
- SRG-APP-000412-CTR-001000
- Vuln IDs
-
- V-233208
- Rule IDs
-
- SV-233208r601877_rule
Checks: C-36144r601876_chk
Validate the container platform web management tools and Application Program Interfaces (API) are configured to use FIPS-validated Advanced Encryption Standard (AES) cipher block algorithms to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions. If the web management tools and API are not configured to use FIPS-validated Advanced Encryption Standard (AES) cipher block algorithms, this is a finding.
Fix: F-36112r601866_fix
Configure the container platform web management tools and Application Program Interfaces (API) with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.
- RMF Control
- RA-5
- Severity
- M
- CCI
- CCI-001067
- Version
- SRG-APP-000414-CTR-001010
- Vuln IDs
-
- V-233210
- Rule IDs
-
- SV-233210r601119_rule
Checks: C-36146r601117_chk
Validate that scanning applications have privileged access to container platform components, containers, and container images to properly perform vulnerability scans. If privileged access is not given to the scanning application, this is a finding.
Fix: F-36114r601118_fix
Configure the vulnerability scanning application to have privileged access to the container platform components, containers, and container images.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-CTR-001015
- Vuln IDs
-
- V-233211
- Rule IDs
-
- SV-233211r601812_rule
Checks: C-36147r601811_chk
Review documentation to verify that the container platform is using NSA-approved cryptography to protect classified data and applications. If the container platform is not using NSA-approved cryptography for classified data and applications, this is a finding.
Fix: F-36115r601121_fix
Configure the container platform to utilize NSA-approved cryptography to protect classified information.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-CTR-001060
- Vuln IDs
-
- V-233220
- Rule IDs
-
- SV-233220r601149_rule
Checks: C-36156r601147_chk
Review container platform keystore documentation and configuration to verify encryption levels meet the information sensitivity level. If the container platform keystore encryption configuration does not meet system requirements, this is a finding.
Fix: F-36124r601148_fix
Configure the container platform keystore encryption to maintain the confidentiality and integrity of information for applicable sensitivity level.
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- SRG-APP-000431-CTR-001065
- Vuln IDs
-
- V-233221
- Rule IDs
-
- SV-233221r601814_rule
Checks: C-36157r601813_chk
Review container platform runtime documentation and configuration is maintaining a separate execution domain for each executing process. Different groups of applications, and services with different security needs, should be deployed in separate namespaces as a first level of isolation. If container platform runtime is not configured to execute processes in separate domains and namespaces, this is a finding. If namespaces use defaults, this is a finding.
Fix: F-36125r601151_fix
Deploy a container platform runtime capable of maintaining a separate execution domain and namespace for each executing process. Create a namespace for each containers, defining them as logical groups.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-CTR-001070
- Vuln IDs
-
- V-233222
- Rule IDs
-
- SV-233222r601816_rule
Checks: C-36158r601815_chk
Review documentation and configuration to determine if the container platform can protect against or limit the effects of all types of DoS attacks by employing defined security safeguards against resource depletion. Examples of resource limits are on memory, storage, and CPU. If the container platform cannot be configured to protect against or limit the effects of all types of DoS, this is a finding.
Fix: F-36126r601154_fix
Configure the container platform to protect against or limit the effects of all types of DoS attacks by employing defined security safeguards. Safeguards such as resource limits on memory, storage, and CPU can be used.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-CTR-001080
- Vuln IDs
-
- V-233224
- Rule IDs
-
- SV-233224r754793_rule
Checks: C-36160r601159_chk
This requirement is NA for this technology.
Fix: F-36128r601160_fix
The requirement is NA. No fix is required.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-CTR-001090
- Vuln IDs
-
- V-233226
- Rule IDs
-
- SV-233226r601818_rule
Checks: C-36162r601817_chk
Review the documentation and deployed configuration to determine if the container platform maintains the confidentiality and integrity of information during preparation before transmission. If the confidentiality and integrity are not maintained using mechanisms such as TLS, TLS VPNs, or IPsec during preparation before transmission, this is a finding.
Fix: F-36130r601166_fix
Configure the container platform to maintain the confidentiality and integrity of information using mechanisms such as TLS, TLS VPNs, or IPsec during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-CTR-001095
- Vuln IDs
-
- V-233227
- Rule IDs
-
- SV-233227r601820_rule
Checks: C-36163r601819_chk
Review documentation and configuration settings to determine if the container platform maintains the confidentiality and integrity of information during reception. If confidentiality and integrity are not maintained using mechanisms such as TLS, TLS VPNs, or IPsec during reception, this is a finding.
Fix: F-36131r601169_fix
Configure the container platform to maintain the confidentiality and integrity using mechanisms such as TLS, TLS VPNs, or IPsec during reception.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-APP-000447-CTR-001100
- Vuln IDs
-
- V-233228
- Rule IDs
-
- SV-233228r601822_rule
Checks: C-36164r601821_chk
Review the configuration to determine if the container platform behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If the container platform does not meet this requirement, this is a finding.
Fix: F-36132r601172_fix
Configure the container platform behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SRG-APP-000450-CTR-001105
- Vuln IDs
-
- V-233229
- Rule IDs
-
- SV-233229r601176_rule
Checks: C-36165r601174_chk
Review the container platform configuration to determine if safeguards are in place to protect the system memory and CPU from resource depletion and unauthorized execution. If safeguards are not in place, this is a finding.
Fix: F-36133r601175_fix
Configure the container platform to have safeguards in place to protect the system memory and CPU from resource depletion and unauthorized code execution.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-APP-000454-CTR-001110
- Vuln IDs
-
- V-233230
- Rule IDs
-
- SV-233230r601824_rule
Checks: C-36166r601823_chk
Review container platform registry documentation and configuration to determine if organization-defined images contains latest approved vendor software image version. If organization-defined images do not contain the latest approved vendor software image version, this is a finding. Review container platform registry documentation and configuration to determine if organization-defined images are removed after updated versions have been installed. If organization-defined images are not removed after updated versions have been installed, this is a finding. Review container platform runtime documentation and configuration to determine if organization-define images are executing latest image version from the container platform registry. If container platform runtime is not executing latest organization-defined images from the container platform registry, this is a finding.
Fix: F-36134r601863_fix
Configure the container platform registry to update organization-defined images with current approved vendor version and remove obsolete images after updated versions have been installed. Configure the container platform runtime to execute latest organization-defined images from the container platform registry.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-APP-000454-CTR-001115
- Vuln IDs
-
- V-233231
- Rule IDs
-
- SV-233231r601826_rule
Checks: C-36167r601825_chk
Review container platform registry documentation and configuration to determine if organization-defined images contains latest approved vendor software image version. If organization-defined images do not contain the latest approved vendor software image version, this is a finding. Review container platform registry documentation and configuration to determine if organization-defined images are removed after updated versions have been installed. If organization-defined images are not removed after updated versions have been installed, this is a finding. Review container platform runtime documentation and configuration to determine if organization-defined images are executing latest image version from the container registry. If container platform runtime is not executing latest organization-defined images from the container platform registry, this is a finding.
Fix: F-36135r601864_fix
Configure the container platform registry to update organization-defined images with current approved vendor version and remove obsolete images after updated versions have been installed. Configure the container platform runtime to execute latest organization-defined images from the container platform registry.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-CTR-001125
- Vuln IDs
-
- V-233233
- Rule IDs
-
- SV-233233r601828_rule
Checks: C-36169r601827_chk
Review documentation and configuration to determine if the container platform registry inspects and contains approved vendor repository latest images containing security-relevant updates within a timeframe directed by an authoritative source (IAVM, CTOs, DTMs, STIGs, etc.). If the container platform registry does not contain the latest image with security-relevant updates within the time period directed by the authoritative source, this is a finding. The container platform registry should help the user understand where the code in the environment was deployed from, and must provide controls that prevent deployment from untrusted sources or registries.
Fix: F-36137r601187_fix
Configure the container platform registry to use approved vendor repository to ensure latest images containing security-relevant updates are installed.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-CTR-001130
- Vuln IDs
-
- V-233234
- Rule IDs
-
- SV-233234r601830_rule
Checks: C-36170r601829_chk
Review documentation and configuration to determine if the container platform registry inspects and contains approved vendor repository latest images containing security-relevant updates within a timeframe directed by an authoritative source (IAVM, CTOs, DTMs, STIGs, etc.). If the container platform registry does not contain the latest image with security-relevant updates within the time period directed by the authoritative source, this is a finding. The container platform registry should help the user understand where the code in the environment was deployed from and must provide controls that prevent deployment from untrusted sources or registries.
Fix: F-36138r601190_fix
Configure the container platform registry to use approved vendor repository to ensure latest images containing security-relevant updates are installed within the time period directed by the authoritative source.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002696
- Version
- SRG-APP-000472-CTR-001170
- Vuln IDs
-
- V-233242
- Rule IDs
-
- SV-233242r601832_rule
Checks: C-36178r601831_chk
Review container platform documentation and configuration verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM). If verification of the correct operation of security functions is not performed, this is a finding.
Fix: F-36146r601214_fix
Configure the container platform configuration and installation settings to perform verification of the correct operation of security functions.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002699
- Version
- SRG-APP-000473-CTR-001175
- Vuln IDs
-
- V-233243
- Rule IDs
-
- SV-233243r601896_rule
Checks: C-36179r601895_chk
Review container platform documentation. Verify that the container platform is configured to perform verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM), upon product startup/restart, by a user with privileged access, and/or every 30 days. If it is not, this is a finding.
Fix: F-36147r601217_fix
Configure the container platform to perform verification of the correct operation of security functions, which may include the connection validation, upon product startup/restart, or by a user with privileged access, and/or every 30 days.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002702
- Version
- SRG-APP-000474-CTR-001180
- Vuln IDs
-
- V-233244
- Rule IDs
-
- SV-233244r601879_rule
Checks: C-36180r601878_chk
Review container platform runtime documentation and configuration settings. If the container platform is not configured to notify organization-defined information system role when anomalies in the operation of security functions as defined by site security plan are discovered, this is a finding.
Fix: F-36148r601220_fix
Configure the container platform runtime to notify system administrator and operation staff when anomalies in the operation of the security functions as defined in site security plan are discovered.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000492-CTR-001220
- Vuln IDs
-
- V-233252
- Rule IDs
-
- SV-233252r601245_rule
Checks: C-36188r601243_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to access security objects. If audit records are not generated, this is a finding.
Fix: F-36156r601244_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts to access security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000493-CTR-001225
- Vuln IDs
-
- V-233253
- Rule IDs
-
- SV-233253r601248_rule
Checks: C-36189r601246_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to access security levels. If audit records are not generated, this is a finding.
Fix: F-36157r601247_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts to access security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000494-CTR-001230
- Vuln IDs
-
- V-233254
- Rule IDs
-
- SV-233254r601251_rule
Checks: C-36190r601249_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to access categories of information. If audit records are not generated, this is a finding.
Fix: F-36158r601250_fix
Configure the container platform to generate audit records on successful/unsuccessful attempts to access categories of information.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-CTR-001235
- Vuln IDs
-
- V-233255
- Rule IDs
-
- SV-233255r601254_rule
Checks: C-36191r601252_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to modify privileges. If audit records are not generated, this is a finding.
Fix: F-36159r601253_fix
Configure the container platform to generate audit records on successful/unsuccessful attempts to modify privileges.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000496-CTR-001240
- Vuln IDs
-
- V-233256
- Rule IDs
-
- SV-233256r601257_rule
Checks: C-36192r601255_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to modify security objects. If audit records are not generated, this is a finding.
Fix: F-36160r601256_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts to modify security objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000497-CTR-001245
- Vuln IDs
-
- V-233257
- Rule IDs
-
- SV-233257r601260_rule
Checks: C-36193r601258_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to modify security levels. If audit records are not generated, this is a finding.
Fix: F-36161r601259_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts to modify security levels.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000498-CTR-001250
- Vuln IDs
-
- V-233258
- Rule IDs
-
- SV-233258r601263_rule
Checks: C-36194r601261_chk
Review the container platform configuration to verify audit records are generated when successful/unsuccessful attempts are made to modify categories of information. If audit records are not generated, this is a finding.
Fix: F-36162r601262_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts are made to modify categories of information.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-CTR-001255
- Vuln IDs
-
- V-233259
- Rule IDs
-
- SV-233259r601266_rule
Checks: C-36195r601264_chk
Review the container platform configuration to verify audit records are generated when successful/unsuccessful attempts are made to delete privileges. If audit records are not generated, this is a finding.
Fix: F-36163r601265_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts are made to delete privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000500-CTR-001260
- Vuln IDs
-
- V-233260
- Rule IDs
-
- SV-233260r601269_rule
Checks: C-36196r601267_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to delete security levels. If audit records are not generated, this is a finding.
Fix: F-36164r601268_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts to delete security levels.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000501-CTR-001265
- Vuln IDs
-
- V-233261
- Rule IDs
-
- SV-233261r601272_rule
Checks: C-36197r601270_chk
Review the container platform configuration to determine if audit records are generated on successful/unsuccessful attempts to delete security objects occur. If audit records are not generated, this is a finding.
Fix: F-36165r601271_fix
Configure the container platform to generate audit records on successful/unsuccessful attempts to delete security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000502-CTR-001270
- Vuln IDs
-
- V-233262
- Rule IDs
-
- SV-233262r601275_rule
Checks: C-36198r601273_chk
Review the container platform configuration to determine if audit records are generated on successful/unsuccessful attempts to delete categories of information occur. If audit records are not generated, this is a finding.
Fix: F-36166r601274_fix
Configure the container platform to generate audit records on successful/unsuccessful attempts to delete categories of information occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-CTR-001275
- Vuln IDs
-
- V-233263
- Rule IDs
-
- SV-233263r601883_rule
Checks: C-36199r601882_chk
Review the container platform configuration for audit logon events. Ensure audit policy for successful and unsuccessful logon events are enabled. Verify events are written to the log. Validate system documentation is current. If logon attempts do not generate log records, this is a finding.
Fix: F-36167r601277_fix
Configure the container platform registry, keystore, and runtime to generate audit log for successful and unsuccessful logon for any all accounts and services. Revise all applicable system documentation.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-CTR-001280
- Vuln IDs
-
- V-233264
- Rule IDs
-
- SV-233264r601281_rule
Checks: C-36200r601279_chk
Review the documentation and configuration guides to determine if the container platform generates log records for privileged activities. If log records are not generated for privileged activities, this is a finding.
Fix: F-36168r601280_fix
Configure the container platform to generate log records for privileged activities.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-CTR-001285
- Vuln IDs
-
- V-233265
- Rule IDs
-
- SV-233265r601840_rule
Checks: C-36201r601839_chk
Review the container platform configuration for audit user access start and end times. Ensure audit policy for user access start and end times are enabled. Verify events are written to the log. Validate system documentation is current. If user access start and end times do not generate log records, this is a finding.
Fix: F-36169r601283_fix
Configure the container platform to generate audit log for user access start and end times for any all accounts and services. Revise all applicable system documentation.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-CTR-001290
- Vuln IDs
-
- V-233266
- Rule IDs
-
- SV-233266r601842_rule
Checks: C-36202r601841_chk
Review the container platform configuration for audit logon events. Ensure audit policy for concurrent logons from different workstations and systems is enabled. Verify events are written to the log. Validate system documentation is current. If concurrent logons from different workstations and systems do not generate log records, this is a finding.
Fix: F-36170r601286_fix
Configure the container platform to generate audit log for concurrent logins from multiple workstations and systems. Revise all applicable system documentation.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000507-CTR-001295
- Vuln IDs
-
- V-233267
- Rule IDs
-
- SV-233267r601844_rule
Checks: C-36203r601884_chk
Review the container platform configuration to verify that the runtime generates audit records on successful/unsuccessful access to objects. If audit records are not generated by the runtime when objects are successfully/unsuccessfully accessed, this is a finding.
Fix: F-36171r601289_fix
Configure the container platform runtime to generate audit records on successful/unsuccessful access to objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000508-CTR-001300
- Vuln IDs
-
- V-233268
- Rule IDs
-
- SV-233268r601293_rule
Checks: C-36204r601291_chk
Review the container platform configuration to determine if direct access of the container platform generates audit records. If audit records are not generated, this is a finding.
Fix: F-36172r601292_fix
Configure the container platform to generate audit records when accessed directly.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000509-CTR-001305
- Vuln IDs
-
- V-233269
- Rule IDs
-
- SV-233269r601846_rule
Checks: C-36205r601885_chk
Review the container platform configuration to determine if the container platform is configured to generate audit records for all account creations, modifications, disabling, and termination events. If the container platform is not configured to generate the audit records, this is a finding.
Fix: F-36173r601295_fix
Configure the container platform to generate audit records for all account creations, modifications, disabling, and termination events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000510-CTR-001310
- Vuln IDs
-
- V-233270
- Rule IDs
-
- SV-233270r601848_rule
Checks: C-36206r601847_chk
Review the container runtime configuration to validate audit record generation for container execution, shutdown, and restart events. If the container runtime does not generate records for container execution, shutdown and restart events, this is a finding.
Fix: F-36174r601298_fix
Configure the container runtime to generate audit records for container execution, shutdown, and restart events.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-CTR-001315
- Vuln IDs
-
- V-233271
- Rule IDs
-
- SV-233271r601850_rule
Checks: C-36207r601886_chk
Review the container platform configuration to validate that valid FIPS 140-2 approved cryptographic modules are being used to generate hashes. If non-valid or unapproved FIPS 140-2 cryptographic modules are being used to generate hashes, this is a finding.
Fix: F-36175r601301_fix
Configure the container platform to use valid FIPS 140-2 approved cryptographic modules to generate hashes.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-CTR-001325
- Vuln IDs
-
- V-233273
- Rule IDs
-
- SV-233273r601852_rule
Checks: C-36209r601851_chk
Review the container platform configuration to determine the services offered by the container platform and validate that any services that are offered are configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs. If container platform services are not configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs, this is a finding.
Fix: F-36177r601307_fix
Configure container services in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-CTR-001330
- Vuln IDs
-
- V-233274
- Rule IDs
-
- SV-233274r601854_rule
Checks: C-36210r601887_chk
Review the container platform configuration and documentation to determine if the platform is configured to store and instantiate industry standard container images. If the container platform cannot instantiate industry standard container images, this is a finding.
Fix: F-36178r601310_fix
Enable the container platform to store and instantiate industry standard container image formats.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-CTR-001335
- Vuln IDs
-
- V-233275
- Rule IDs
-
- SV-233275r601314_rule
Checks: C-36211r601312_chk
Review the container platform to validate continuous vulnerability scans of components, containers, and container images are being performed. If continuous vulnerability scans are not being performed, this is a finding.
Fix: F-36179r601313_fix
Implement continuous vulnerability scans of container platform components, containers, and container images either by the container platform or from external vulnerability scanning applications.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-APP-000560-CTR-001340
- Vuln IDs
-
- V-233276
- Rule IDs
-
- SV-233276r601317_rule
Checks: C-36212r601315_chk
Review the container platform configuration to determine if TLS versions 1.0 and 1.1, SSL 2.0 and 3.0 are prohibited for communication. If communication using TLS versions 1.0 and 1.1, SSL 2.0 and 3.0 is permitted, this is a finding.
Fix: F-36180r601316_fix
Configure the container platform to prohibit communication using TLS versions 1.0 and 1.1, SSL 2.0 and 3.0.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000605-CTR-001380
- Vuln IDs
-
- V-233284
- Rule IDs
-
- SV-233284r601856_rule
Checks: C-36220r601855_chk
Review the container platform configuration to verify the container platform is validating certificates used for Transport Layer Security (TLS) functions by performing a RFC 5280-compliant certification path validation and that self-signed certificates are not being used. If the container platform is not validating certificates used for TLS functions by performing an RFC 5280-compliant certification path validation, this is a finding. If self-signed certificates are in use, this is a finding.
Fix: F-36188r601340_fix
Configure the container platform to validate certificates used for Transport Layer Security (TLS) functions by performing an RFC 5280-compliant certification path validation and to disable the use of self-signed certificates.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000610-CTR-001385
- Vuln IDs
-
- V-233285
- Rule IDs
-
- SV-233285r601897_rule
Checks: C-36221r601857_chk
Review the container platform configuration to validate that a FIPS-validated SHA-2 or higher hash function is being used for digital signature generation and verification. If a FIPS-validated SHA-2 or higher hash function is not being used for digital signature generation and verification, this is a finding.
Fix: F-36189r601343_fix
Configure the container platform to use a FIPS-validated SHA-2 or higher hash function for digital signature generation and verification.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-APP-000635-CTR-001405
- Vuln IDs
-
- V-233289
- Rule IDs
-
- SV-233289r601356_rule
Checks: C-36225r601354_chk
Review the container platform configuration to ensure FIPS-validated cryptographic modules are implemented to encrypt unclassified information requiring confidentiality. If FIPS-validated cryptographic modules are not being used, this is a finding.
Fix: F-36193r601355_fix
Configure the container platform to use FIPS-validated cryptographic modules to encrypt unclassified information requiring confidentiality.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- SRG-APP-000645-CTR-001410
- Vuln IDs
-
- V-233290
- Rule IDs
-
- SV-233290r601860_rule
Checks: C-36226r601859_chk
Review the container platform configuration to verify that container platform is not using protocols that transmit authentication data unencrypted and that the container platform is not using flawed cryptographic algorithms for transmission. If the container platform is using protocols to transmit authentication data unencrypted or is using flawed cryptographic algorithms, this is a finding.
Fix: F-36194r601358_fix
Configure the container platform to use protocols that transmit authentication data encrypted and to use cryptographic algorithms that are not flawed.