Container Platform Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +16 −4 ✎ 9
Comparison against the immediately-prior release (V1R5). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 16
- V-263586 Medium The container platform must disable accounts when the accounts are no longer associated to a user.
- V-263587 Medium The container platform must implement the capability to centrally review and analyze audit records from multiple components within the system.
- V-263588 Medium The container platform must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- V-263589 Medium The container platform must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-263590 Medium The container platform must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- V-263591 Medium The container platform must for password-based authentication, maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
- V-263592 Medium The container platform must for password-based authentication, update the list of passwords on an organization-defined frequency.
- V-263593 Medium The container platform must for password-based authentication, update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- V-263594 Medium The container platform must for password-based authentication, verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- V-263595 Medium The container platform must for password-based authentication, require immediate selection of a new password upon account recovery.
- V-263596 Medium The container platform must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.
- V-263597 Medium The container platform must for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.
- V-263598 Medium The container platform must protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
- V-263599 Medium The container platform must include only approved trust anchors in trust stores or certificate stores managed by the organization.
- V-263600 Medium The container platform must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- V-263601 Medium The container platform must synchronize system clocks within and between systems or system components.
Removed rules 4
- V-233089 Medium The container platform must prohibit password reuse for a minimum of five generations.
- V-233193 Medium The container platform must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
- V-233194 Medium The container platform must require devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication.
- V-233199 Medium The container platform must allow the use of a temporary password for system logons with an immediate change to a permanent password.
Content changes 9
- V-233064 Medium check The container platform must be built from verified packages.
- V-233082 Medium descriptioncheckfix The container platform must use multifactor authentication for local access to nonprivileged accounts.
- V-233085 Medium descriptioncheckfix The container platform must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
- V-233095 Medium description For container platform using password authentication, the application must store only cryptographic representations of passwords.
- V-233098 Medium description The container platform must enforce a 60-day maximum password lifetime restriction.
- V-233143 Medium descriptioncheckfix The container platform must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are created.
- V-233158 Medium descriptioncheckfix The container platform must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.
- V-233184 Medium check The container platform must prohibit the installation of patches and updates without explicit privileged status.
- V-233186 Medium checkfix The container platform registry must prohibit installation or modification of container images without explicit privileged status.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-APP-000014-CTR-000035
- Vuln IDs
-
- V-233015
- Rule IDs
-
- SV-233015r960759_rule
Checks: C-35951r600532_chk
Review the container platform configuration to verify that TLS 1.2 or greater is being used for secure container image transport from trusted sources. If TLS 1.2 or greater is not being used for secure container image transport, this is a finding.
Fix: F-35919r600533_fix
Configure the container platform to use TLS 1.2 or greater when components communicate internally or externally. The fix ensures that all communication components in the container platform are configured to utilize secure versions of TLS.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-APP-000014-CTR-000040
- Vuln IDs
-
- V-233016
- Rule IDs
-
- SV-233016r960759_rule
Checks: C-35952r600535_chk
Review the container platform configuration to verify that TLS 1.2 or greater is being used for communication by the container platform nodes and components. If TLS 1.2 or greater is not being used for secure communication, this is a finding.
Fix: F-35920r600536_fix
Configure the container platform to use TLS 1.2 or greater for node and component communication.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000023-CTR-000055
- Vuln IDs
-
- V-233019
- Rule IDs
-
- SV-233019r960768_rule
Checks: C-35955r600544_chk
Review the container platform to determine if it is using a centralized user management system for user management functions. If the container platform is not using a centralized user management system for user management functions, this is a finding.
Fix: F-35923r600545_fix
Configure the container platform to use a centralized user management system for user management functions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-CTR-000060
- Vuln IDs
-
- V-233020
- Rule IDs
-
- SV-233020r960771_rule
Checks: C-35956r600547_chk
Review the container platform configuration to determine if temporary user accounts are automatically removed or disabled after 72 hours. If temporary user accounts are not automatically removed or disabled after 72 hours, this is a finding.
Fix: F-35924r600548_fix
Configure the container platform to automatically remove or disable temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- SRG-APP-000025-CTR-000065
- Vuln IDs
-
- V-233021
- Rule IDs
-
- SV-233021r960774_rule
Checks: C-35957r601888_chk
Determine if the container platform automatically disables accounts after a 35-day period of account inactivity. If the container platform does not automatically disable accounts after a 35-day period of account inactivity, this is a finding.
Fix: F-35925r601889_fix
Configure the container platform to automatically disable accounts after a 35-day period of account inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-CTR-000070
- Vuln IDs
-
- V-233022
- Rule IDs
-
- SV-233022r960777_rule
Checks: C-35958r600553_chk
Review the container platform configuration to determine if audit records are automatically created upon account creation. If audit records are not automatically created upon account creation, this is a finding.
Fix: F-35926r600554_fix
Configure the container platform to automatically create audit records on account creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-CTR-000075
- Vuln IDs
-
- V-233023
- Rule IDs
-
- SV-233023r960780_rule
Checks: C-35959r600556_chk
Review the container platform configuration to determine if account modification is automatically audited. If account modification is not automatically audited, this is a finding.
Fix: F-35927r600557_fix
Configure the container platform to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-CTR-000080
- Vuln IDs
-
- V-233024
- Rule IDs
-
- SV-233024r960783_rule
Checks: C-35960r600559_chk
Review the container platform configuration to determine if account disabling is automatically audited. If account disabling is not automatically audited, this is a finding.
Fix: F-35928r600560_fix
Configure the container platform to automatically audit account disabling.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-CTR-000085
- Vuln IDs
-
- V-233025
- Rule IDs
-
- SV-233025r960786_rule
Checks: C-35961r600562_chk
Review the container platform configuration to determine if account removal is automatically audited. If account removal is not automatically audited, this is a finding.
Fix: F-35929r600563_fix
Configure the container platform to automatically audit account removal.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-CTR-000090
- Vuln IDs
-
- V-233026
- Rule IDs
-
- SV-233026r960792_rule
Checks: C-35962r601602_chk
Review the container platform configuration to determine if least privilege and need-to-know access is being used for container platform registry access. If least privilege and need-to-know access is not being used for container platform registry access, this is a finding.
Fix: F-35930r600566_fix
Configure the container platform to use least privilege and need to know when granting access to the container platform registry. The fix ensures the proper roles and permissions are configured.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-CTR-000095
- Vuln IDs
-
- V-233027
- Rule IDs
-
- SV-233027r960792_rule
Checks: C-35963r600568_chk
Review the container platform to determine if only those individuals with runtime duties have access to the container platform runtime. If users have access to the container platform runtime that do not have runtime duties, this is a finding.
Fix: F-35931r600569_fix
Configure the container platform to use least privilege and need to know when granting access to the container runtime. The fix ensures the proper roles and permissions are configured.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-CTR-000100
- Vuln IDs
-
- V-233028
- Rule IDs
-
- SV-233028r960792_rule
Checks: C-35964r600571_chk
Review the container platform to determine if only those individuals with keystore duties have access to the container platform keystore. If users have access to the container platform keystore that do not have keystore duties, this is a finding.
Fix: F-35932r600572_fix
Configure the container platform to use least privilege and need to know when granting access to the container keystore. The fix ensures the proper roles and permissions are configured.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-APP-000038-CTR-000105
- Vuln IDs
-
- V-233029
- Rule IDs
-
- SV-233029r960801_rule
Checks: C-35965r601604_chk
Review the container platform to determine if approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies is being enforced. If the organization-defined information flow policies are not being enforced, this is a finding.
Fix: F-35933r600575_fix
Configure the container platform to enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-APP-000039-CTR-000110
- Vuln IDs
-
- V-233030
- Rule IDs
-
- SV-233030r960804_rule
Checks: C-35966r600577_chk
Review the container platform configuration to determine if organization-defined information flow controls are implemented. If information flow controls are not implemented, this is a finding.
Fix: F-35934r600578_fix
Configure the container platform to implement organization-defined information flow controls.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-CTR-000115
- Vuln IDs
-
- V-233031
- Rule IDs
-
- SV-233031r960840_rule
Checks: C-35967r601606_chk
Review the container platform to determine if it is configured to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. If the container platform is not configured to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period, this is a finding.
Fix: F-35935r600581_fix
Configure the container platform to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- SRG-APP-000068-CTR-000120
- Vuln IDs
-
- V-233032
- Rule IDs
-
- SV-233032r960843_rule
Checks: C-35968r601608_chk
Review the container platform configuration to determine if the Standard Mandatory DoD Notice and Consent Banner is configured to be displayed before granting access to platform components. Log in to the container platform components and verify that the Standard Mandatory DoD Notice and Consent Banner is being displayed before granting access. If the Standard Mandatory DoD Notice and Consent Banner is not configured or is not displayed before granting access to container platform components, this is a finding.
Fix: F-35936r600584_fix
Configure the container platform to display the Standard Mandatory DoD Notice and Consent Banner before granting access to container platform components.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000050
- Version
- SRG-APP-000069-CTR-000125
- Vuln IDs
-
- V-233033
- Rule IDs
-
- SV-233033r960846_rule
Checks: C-35969r601610_chk
Log in to the container platform components to determine if the Standard Mandatory DoD Notice and Consent Banner remains on the screen until users acknowledge the usage and conditions and take explicit actions to log on for further access. If the Standard Mandatory DoD Notice and Consent Banner does not stay on the screen until the users acknowledge the usage and conditions, this is a finding.
Fix: F-35937r600587_fix
Configure the container platform to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage and conditions and take explicit actions to log on for further access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-CTR-000150
- Vuln IDs
-
- V-233038
- Rule IDs
-
- SV-233038r960879_rule
Checks: C-35974r601612_chk
Review the container platform configuration to determine if the container platform is configured to generate audit records for all DoD-defined auditable events within all components in the platform. Generate DoD-defined auditable events within all the components to determine if the events are being audited. If the container platform is not configured to generate audit records for all DoD-defined auditable events within the components or the events are not generating audit records, this is a finding.
Fix: F-35942r600602_fix
Configure the container platform to generate audit records for all DoD-defined auditable events within all the components of the container platform.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-APP-000090-CTR-000155
- Vuln IDs
-
- V-233039
- Rule IDs
-
- SV-233039r960882_rule
Checks: C-35975r601614_chk
Review the container platform to determine if the container platform is configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. If the container platform is not configured to only allow the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited, this is a finding.
Fix: F-35943r600605_fix
Configure the container platform to only allow the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-CTR-000160
- Vuln IDs
-
- V-233040
- Rule IDs
-
- SV-233040r960885_rule
Checks: C-35976r601616_chk
Review the container platform configuration to determine if it is configured to generate audit records when successful/unsuccessful attempts are made to access privileges. If the container platform is not configured to generate audit records on successful/unsuccessful access to privileges, this is a finding.
Fix: F-35944r600608_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts are made to access privileges occur.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-CTR-000165
- Vuln IDs
-
- V-233041
- Rule IDs
-
- SV-233041r960888_rule
Checks: C-35977r601870_chk
Review the container platform configuration for session audits. Ensure audit policy for session logging at startup is enabled. Verify events are written to the log. Validate system documentation is current. If the container platform is not configured to meet this requirement, this is a finding.
Fix: F-35945r600611_fix
Configure the container platform to generate audit logs for session logging at startup. Revise all applicable system documentation.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-CTR-000170
- Vuln IDs
-
- V-233042
- Rule IDs
-
- SV-233042r960891_rule
Checks: C-35978r601620_chk
Review the container platform configuration for audit event types. Ensure audit policy for event type is enabled. Verify records showing what type of event occurred are written to the log. Validate system documentation is current. If log data does not show the type of event, this is a finding.
Fix: F-35946r600614_fix
Configure the container platform to include the event type in the log data. Revise all applicable system documentation.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-CTR-000175
- Vuln IDs
-
- V-233043
- Rule IDs
-
- SV-233043r960894_rule
Checks: C-35979r601622_chk
Review the container platform configuration for audit events date and time. Ensure audit policy for event date and time are enabled. Verify records showing event date and time are included in the log. Validate system documentation is current. If the date and time are not included, this is a finding.
Fix: F-35947r600617_fix
Configure the container platform to include log date and time with the event. Revise all applicable system documentation.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-CTR-000180
- Vuln IDs
-
- V-233044
- Rule IDs
-
- SV-233044r960897_rule
Checks: C-35980r601624_chk
Review the container platform configuration to determine if all audit records identify where in the container platform the event occurred. Generate audit records and view the audit records to verify that the records do identify where in the container platform the event occurred. If the container platform is not configured to generate audit records that identify where in the container platform the event occurred, or if the generated audit records do not identify where in the container platform the event occurred, this is a finding.
Fix: F-35948r600620_fix
Configure the container platform to generate audit records that identify where in the container platform the event occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-CTR-000185
- Vuln IDs
-
- V-233045
- Rule IDs
-
- SV-233045r960900_rule
Checks: C-35981r601626_chk
Review container platform audit policy configuration for logons establishing the sources of events. Ensure audit policy is configured to generate sufficient information to resolve the source, e.g., source IP, of the log event. Verify records showing by requesting a user access the container platform and generate log events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-35949r600623_fix
Configure the container platform registry, keystore, and runtime to generate the source of each loggable event. Revise all applicable system documentation.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-CTR-000190
- Vuln IDs
-
- V-233046
- Rule IDs
-
- SV-233046r960903_rule
Checks: C-35982r601628_chk
Review the container platform configuration to determine if audit records contain the audit event results. Generate audit records and review the data to validate that the record does contain the event result. If the container platform is not configured to generate audit records with the event result or the audit record does not contain the event result, this is a finding.
Fix: F-35950r600626_fix
Configure the container platform to generate audit records that contain the event result.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-CTR-000195
- Vuln IDs
-
- V-233047
- Rule IDs
-
- SV-233047r960906_rule
Checks: C-35983r601630_chk
Review container platform documentation and the log files on the application server to determine if the logs contain information that establishes the identity of the user or process associated with log event data. If the container platform does not produce logs that establish the identity of the user or process associated with log event data, this is a finding.
Fix: F-35951r600629_fix
Configure the container platform logging system to log the identity of the user or process related to the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-CTR-000200
- Vuln IDs
-
- V-233048
- Rule IDs
-
- SV-233048r960906_rule
Checks: C-35984r601632_chk
Review the container platform configuration to determine if it is configured to generate audit records that contain the component information that generated the audit record. Generate audit records and review the data to determine if records are generated containing the component information that generated the record. If the container platform is not configured to generate audit records containing the component information or records are generated that do not contain the component information that generated the record, this is a finding.
Fix: F-35952r600632_fix
Configure the container platform to include the component information that generated the audit record.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-CTR-000205
- Vuln IDs
-
- V-233049
- Rule IDs
-
- SV-233049r960909_rule
Checks: C-35985r601634_chk
Review the documentation and deployment configuration to determine if the container platform is configured to generate full-text recording of privileged commands or the individual identities of group users at a minimum. Have a user execute a privileged command and review the log data to validate that the full-text or identity of the individual is being logged. If the container platform is not meeting this requirement, this is a finding.
Fix: F-35953r600635_fix
Configure the container platform to generate the full-text recording of privileged commands, or the individual identities of group users, or both.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-CTR-000215
- Vuln IDs
-
- V-233051
- Rule IDs
-
- SV-233051r960915_rule
Checks: C-35987r601636_chk
Review the configuration settings to determine how the container platform components are configured for audit failures. When the audit failure is due to the lack of audit record storage, the container platform must continue generating audit records, restarting services if necessary, and overwrite the oldest audit records in a first-in-first-out manner. If the audit failure is due to a communication to a centralized collection server, the container platform must queue audit records locally until communication is restored or the records are retrieved manually. If the container platform is not configured to handle audit failures appropriately, this is a finding.
Fix: F-35955r601861_fix
Configure the container platform to continue generating audit records overwriting oldest audit records in a first-in-first-out manner when the failure is due to a lack of audit record storage. When the audit failure is due to a communication to a centralized collection server, configure the container platform to queue audit records locally until communication is restored or the records are retrieved manually. If other actions are to be taken for audit record failures, the actions and rationale must be documented in the system security plan and risk acceptance approvals must be obtained.
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- SRG-APP-000111-CTR-000220
- Vuln IDs
-
- V-233052
- Rule IDs
-
- SV-233052r960918_rule
Checks: C-35988r601638_chk
Review the configuration settings to determine if the container platform components are configured to send audit events to central managed audit log repository. If the container platform is not configured to send audit events to central managed audit log repository, this is a finding.
Fix: F-35956r600644_fix
Configure the container platform components to send audit logs to a central managed audit log repository.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-CTR-000235
- Vuln IDs
-
- V-233055
- Rule IDs
-
- SV-233055r960927_rule
Checks: C-35991r600652_chk
Review the container platform configuration files to determine if the internal system clock is used for time stamps. If the container platform does not use the internal system clock to generate time stamps, this is a finding.
Fix: F-35959r600653_fix
Configure the container platform to use internal system clocks to generate time stamps for log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-CTR-000240
- Vuln IDs
-
- V-233056
- Rule IDs
-
- SV-233056r960930_rule
Checks: C-35992r600655_chk
Review the container platform configuration to determine where audit information is stored. If the audit information is not protected from any type of unauthorized read access, this is a finding.
Fix: F-35960r600656_fix
Configure the container platform to protect the storage of audit information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-CTR-000245
- Vuln IDs
-
- V-233057
- Rule IDs
-
- SV-233057r960933_rule
Checks: C-35993r600658_chk
Review the container platform configuration to determine where audit information is stored. If the audit log data is not protected from unauthorized modification, this is a finding.
Fix: F-35961r600659_fix
Configure the container platform to protect the storage of audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-CTR-000250
- Vuln IDs
-
- V-233058
- Rule IDs
-
- SV-233058r960936_rule
Checks: C-35994r600661_chk
Review the container platform configuration to determine where audit information is stored. If the audit log data is not protected from unauthorized deletion, this is a finding.
Fix: F-35962r600662_fix
Configure the container platform to protect the storage of audit information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-CTR-000255
- Vuln IDs
-
- V-233059
- Rule IDs
-
- SV-233059r960939_rule
Checks: C-35995r600664_chk
Review the container platform to validate container platform audit tools are protected from unauthorized access. If the audit tools are not protected from unauthorized access, this is a finding.
Fix: F-35963r600665_fix
Configure the container platform to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-CTR-000260
- Vuln IDs
-
- V-233060
- Rule IDs
-
- SV-233060r960942_rule
Checks: C-35996r600667_chk
Review the container platform to validate container platform audit tools are protected from unauthorized modification. If the audit tools are not protected from unauthorized modification, this is a finding.
Fix: F-35964r600668_fix
Configure the container platform to protect audit tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-CTR-000265
- Vuln IDs
-
- V-233061
- Rule IDs
-
- SV-233061r960945_rule
Checks: C-35997r600670_chk
Review the container platform to validate container platform audit tools are protected from unauthorized deletion. If the audit tools are not protected from unauthorized deletion, this is a finding.
Fix: F-35965r600671_fix
Configure the container platform to protect audit tools from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001350
- Version
- SRG-APP-000126-CTR-000275
- Vuln IDs
-
- V-233063
- Rule IDs
-
- SV-233063r960951_rule
Checks: C-35999r601673_chk
Review the container platform configuration to determine if FIPS-validated cryptographic mechanisms are being used to protect the integrity of log information. If FIPS-validated cryptographic mechanisms are not being used to protect the integrity of log information, this is a finding.
Fix: F-35967r600677_fix
Configure the container platform to use FIPS-validated cryptographic mechanisms to protect the integrity of log information.
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- SRG-APP-000131-CTR-000280
- Vuln IDs
-
- V-233064
- Rule IDs
-
- SV-233064r981843_rule
Checks: C-36000r981842_chk
Review the container platform configuration to verify it has been built from packages that are digitally signed by known and approved sources. If the container platform was built from packages that are not digitally signed or are from unknown or nonapproved sources, this is a finding.
Fix: F-35968r600680_fix
Rebuild the container platform from verified packages that are digitally signed by known and approved sources.
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- SRG-APP-000131-CTR-000285
- Vuln IDs
-
- V-233065
- Rule IDs
-
- SV-233065r981844_rule
Checks: C-36001r601696_chk
Review the container platform configuration to determine if container images are verified by enforcing image signing and that the image is signed recognized by an approved source. If container images are not verified or the signature is not verified as a recognized and approved source, this is a finding.
Fix: F-35969r600683_fix
Configure the container platform to verify container images are digitally signed and the signature is from a recognized and approved source.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-CTR-000290
- Vuln IDs
-
- V-233066
- Rule IDs
-
- SV-233066r960960_rule
Checks: C-36002r601872_chk
Review the container platform registry configuration to determine if the level of access to the registry is controlled through user privileges. Attempt to perform registry operations to determine if the privileges are enforced. If the container platform registry is not limited through user privileges or the user privileges are not enforced, this is a finding.
Fix: F-35970r600686_fix
Configure the container platform to use and enforce user privileges when accessing the container platform registry.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-CTR-000295
- Vuln IDs
-
- V-233067
- Rule IDs
-
- SV-233067r960960_rule
Checks: C-36003r601700_chk
Review the container platform runtime configuration to determine if the level of access to the runtime is controlled through user privileges. Attempt to perform runtime operations to determine if the privileges are enforced. If the container platform runtime is not limited through user privileges or the user privileges are not enforced, this is a finding.
Fix: F-35971r600689_fix
Configure the container platform to use and enforce user privileges when accessing the container platform runtime.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-CTR-000300
- Vuln IDs
-
- V-233068
- Rule IDs
-
- SV-233068r960960_rule
Checks: C-36004r601873_chk
Review the container platform keystore configuration to determine if the level of access to the keystore is controlled through user privileges. Attempt to perform keystore operations to determine if the privileges are enforced. If the container platform keystore is not limited through user privileges or the user privileges are not enforced, this is a finding.
Fix: F-35972r600692_fix
Configure the container platform to use and enforce user privileges when accessing the container platform keystore.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-CTR-000305
- Vuln IDs
-
- V-233069
- Rule IDs
-
- SV-233069r960960_rule
Checks: C-36005r600694_chk
Review the container platform to verify that configuration files cannot be modified by non-privileged users. If non-privileged users can modify configuration files, this is a finding.
Fix: F-35973r600695_fix
Configure the container platform to only allow configuration modifications by privileged users.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-CTR-000310
- Vuln IDs
-
- V-233070
- Rule IDs
-
- SV-233070r960960_rule
Checks: C-36006r600697_chk
Review the container platform to verify that authentication files cannot be modified by non-privileged users. If non-privileged users can modify key and certificate files, this is a finding.
Fix: F-35974r600698_fix
Configure the container platform to only allow authentication file modifications by privileged users.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-CTR-000315
- Vuln IDs
-
- V-233071
- Rule IDs
-
- SV-233071r960963_rule
Checks: C-36007r600700_chk
Review the container platform configuration and verify that only those components needed for operation are installed. If components are installed that are not used for the intended purpose of the organization, this is a finding.
Fix: F-35975r600701_fix
Identify the role the container platform is intended to play in the production environment and remove any components that are not needed or used for the intended purpose.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-CTR-000320
- Vuln IDs
-
- V-233072
- Rule IDs
-
- SV-233072r960963_rule
Checks: C-36008r600703_chk
Review the container platform registry and the container images being stored. If container images are stored in the registry and are not being used to offer container platform capabilities, this is a finding.
Fix: F-35976r600704_fix
Remove all container images from the container platform registry that are not being used or contain features and functions not supported by the platform.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-CTR-000325
- Vuln IDs
-
- V-233073
- Rule IDs
-
- SV-233073r960966_rule
Checks: C-36009r601891_chk
Review the container platform documentation and deployment configuration to determine which ports and protocols are enabled. Verify the ports and protocols being used are not prohibited by PPSM CAL in accordance to DoD Instruction 8551.01 Policy and are necessary for the operations and applications. If any of the ports or protocols is prohibited or not necessary for the operation, this is a finding.
Fix: F-35977r600707_fix
Configure the container platform to disable any ports or protocols that are prohibited by the PPSM CAL and not necessary for the operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-CTR-000330
- Vuln IDs
-
- V-233074
- Rule IDs
-
- SV-233074r960966_rule
Checks: C-36010r601706_chk
Review the container platform configuration and the containers within the platform by performing the following checks: 1. Verify the container platform is configured to disallow the use of privileged ports by containers. 2. Validate all containers within the container platform are using non-privileged ports. 3. Attempt to instantiate a container image that uses a privileged port. If the container platform is not configured to disallow the use of privileged ports, this is a finding. If the container platform has containers using privileged ports, this is a finding. If the container platform allows containers to be instantiated that use privileged ports, this is a finding.
Fix: F-35978r600710_fix
Configure the container platform to disallow the use of privileged ports by containers. Move any containers that are using privileged ports to non-privileged ports.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-CTR-000335
- Vuln IDs
-
- V-233075
- Rule IDs
-
- SV-233075r960969_rule
Checks: C-36011r600712_chk
Review the container platform configuration to determine if users are uniquely identified and authenticated. If users are not uniquely identified or are not authenticated, this is a finding.
Fix: F-35979r600713_fix
Configure the container platform to uniquely identify and authenticate users.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-CTR-000340
- Vuln IDs
-
- V-233076
- Rule IDs
-
- SV-233076r960969_rule
Checks: C-36012r600715_chk
Review the container platform configuration to determine if users are uniquely identified and authenticated before the API is executed. If users are not uniquely identified or are not authenticated, this is a finding.
Fix: F-35980r600716_fix
Configure the container platform to uniquely identify and authenticate users before container platform API access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-CTR-000345
- Vuln IDs
-
- V-233077
- Rule IDs
-
- SV-233077r960969_rule
Checks: C-36013r600718_chk
Review the container platform configuration to determine if processes acting on behalf of users are uniquely identified and authenticated. If processes acting on behalf of users are not uniquely identified or are not authenticated, this is a finding.
Fix: F-35981r600719_fix
Configure the container platform to uniquely identify and authenticate processes acting on behalf of users.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-CTR-000350
- Vuln IDs
-
- V-233078
- Rule IDs
-
- SV-233078r960969_rule
Checks: C-36014r601708_chk
Review the container platform API configuration to determine if processes acting on behalf of users are uniquely identified and authenticated. If processes acting on behalf of users are not uniquely identified or are not authenticated, this is a finding.
Fix: F-35982r600722_fix
Configure the container platform API to uniquely identify and authenticate processes acting on behalf of users.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-CTR-000355
- Vuln IDs
-
- V-233079
- Rule IDs
-
- SV-233079r960972_rule
Checks: C-36015r601710_chk
Review the container platform configuration to determine if the container platform is configured to use multifactor authentication for network access to privileged accounts. If the container platform does not use multifactor authentication for network access to privileged accounts, this is a finding.
Fix: F-35983r600725_fix
Configure the container platform to use multifactor authentication for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000150-CTR-000360
- Vuln IDs
-
- V-233080
- Rule IDs
-
- SV-233080r960975_rule
Checks: C-36016r601712_chk
Review the container platform configuration to determine if the container platform is configured to use multifactor authentication for network access to non-privileged accounts. If the container platform does not use multifactor authentication for network access to non-privileged accounts, this is a finding.
Fix: F-35984r600728_fix
Configure the container platform to use multifactor authentication for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000151-CTR-000365
- Vuln IDs
-
- V-233081
- Rule IDs
-
- SV-233081r981845_rule
Checks: C-36017r600730_chk
Review the container platform configuration to determine if multifactor authentication is used for local access to privileged accounts. If multifactor authentication for local access to privileged accounts is not being used, this is a finding.
Fix: F-35985r600731_fix
Configure the container platform to use multifactor authentication for local access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000152-CTR-000370
- Vuln IDs
-
- V-233082
- Rule IDs
-
- SV-233082r981848_rule
Checks: C-36018r981846_chk
Review the container platform configuration to determine if multifactor authentication is used for local access to nonprivileged accounts. If multifactor authentication for local access to nonprivileged accounts is not being used, this is a finding.
Fix: F-35986r981847_fix
Configure the container platform to use multifactor authentication for local access to nonprivileged accounts.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000153-CTR-000375
- Vuln IDs
-
- V-233083
- Rule IDs
-
- SV-233083r981849_rule
Checks: C-36019r601714_chk
Review the container platform configuration to determine if the container platform is configured to ensure users are authenticated with an individual authenticator prior to using a group authenticator. If the container platform is not configured to ensure users are authenticated with an individual authenticator prior to using a group authenticator, this is a finding.
Fix: F-35987r600737_fix
Configure the container platform to ensure users are authenticated with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000156-CTR-000380
- Vuln IDs
-
- V-233084
- Rule IDs
-
- SV-233084r960993_rule
Checks: C-36020r601716_chk
Review the container platform configuration to determine if the container platform is configured to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts. If the container platform is not configured to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts, this is a finding.
Fix: F-35988r600740_fix
Configure the container platform to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000157-CTR-000385
- Vuln IDs
-
- V-233085
- Rule IDs
-
- SV-233085r981852_rule
Checks: C-36021r981850_chk
Review the container platform configuration to determine if the container platform is configured to provide replay-resistant authentication mechanisms for network access to nonprivileged accounts. If the container platform is not configured to provide replay-resistant authentication mechanisms for network access to nonprivileged accounts, this is a finding.
Fix: F-35989r981851_fix
Configure the container platform to provide replay-resistant authentication mechanisms for network access to nonprivileged accounts.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-APP-000158-CTR-000390
- Vuln IDs
-
- V-233086
- Rule IDs
-
- SV-233086r960999_rule
Checks: C-36022r601720_chk
Review the container platform configuration to determine if the container platform uniquely identifies all nodes before establishing a connection. If the container platform is not configured to uniquely identify all nodes before establishing the connection, this is a finding.
Fix: F-35990r600746_fix
Configure the container platform to uniquely identify all nodes before establishing the connection.
- RMF Control
- Severity
- M
- CCI
- CCI-003627
- Version
- SRG-APP-000163-CTR-000395
- Vuln IDs
-
- V-233087
- Rule IDs
-
- SV-233087r981853_rule
Checks: C-36023r601722_chk
Review the container platform configuration to determine if the container platform is configured to disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. If identifiers are not disabled after 35 days of inactivity, this is a finding.
Fix: F-35991r600749_fix
Configure the container platform to disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000164-CTR-000400
- Vuln IDs
-
- V-233088
- Rule IDs
-
- SV-233088r981854_rule
Checks: C-36024r600751_chk
Review the container platform configuration to determine if the container platform enforces a minimum 15-character password length. If the container platform does not enforce a 15-character password length, this is a finding.
Fix: F-35992r600752_fix
Configure the container platform to enforce a minimum 15-character password length.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000166-CTR-000410
- Vuln IDs
-
- V-233090
- Rule IDs
-
- SV-233090r981856_rule
Checks: C-36026r601724_chk
Review the container platform configuration to determine if it enforces password complexity by requiring that at least one uppercase character be used. If the container platform does not enforce password complexity by requiring that at least one uppercase character be used, this is a finding.
Fix: F-35994r600758_fix
Configure the container platform to enforce password complexity by requiring that at least one uppercase character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000167-CTR-000415
- Vuln IDs
-
- V-233091
- Rule IDs
-
- SV-233091r981857_rule
Checks: C-36027r601726_chk
Review the container platform configuration to determine if it enforces password complexity by requiring that at least one lowercase character be used. If the container platform does not enforce password complexity by requiring that at least one lowercase character be used, this is a finding.
Fix: F-35995r600761_fix
Configure the container platform to enforce password complexity by requiring that at least one lowercase character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000168-CTR-000420
- Vuln IDs
-
- V-233092
- Rule IDs
-
- SV-233092r981858_rule
Checks: C-36028r601728_chk
Review the container platform configuration to determine if it enforces password complexity by requiring that at least one numeric character be used. If the container platform does not enforce password complexity by requiring that at least one numeric character be used, this is a finding.
Fix: F-35996r600764_fix
Configure the container platform to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000169-CTR-000425
- Vuln IDs
-
- V-233093
- Rule IDs
-
- SV-233093r981859_rule
Checks: C-36029r601730_chk
Review the container platform configuration to determine if it enforces password complexity by requiring that at least one special character be used. If the container platform does not enforce password complexity by requiring that at least one special character be used, this is a finding.
Fix: F-35997r600767_fix
Configure the container platform to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000170-CTR-000430
- Vuln IDs
-
- V-233094
- Rule IDs
-
- SV-233094r981860_rule
Checks: C-36030r601732_chk
Review the container platform configuration to determine if it requires the change of at least 15 of the total number of characters when passwords are changed. If the container platform does not require the change of at least 15 of the total number of characters when passwords are changed, this is a finding.
Fix: F-35998r600770_fix
Configure the container platform to require the change of at least 15 of the total number of characters when passwords are changed.
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- SRG-APP-000171-CTR-000435
- Vuln IDs
-
- V-233095
- Rule IDs
-
- SV-233095r981861_rule
Checks: C-36031r601734_chk
Review the container platform configuration to determine if it using password authentication and stores only cryptographic representations of the passwords. If the container platform is using password authentication and does not store only cryptographic representations of passwords, this is a finding.
Fix: F-35999r600773_fix
Configure the container platform to store only cryptographic representations of passwords if passwords are being used for authentication.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-APP-000172-CTR-000440
- Vuln IDs
-
- V-233096
- Rule IDs
-
- SV-233096r961029_rule
Checks: C-36032r600775_chk
Review the documentation and configuration to determine if the container platform enforces the required FIPS-validated encrypt passwords when they are transmitted. If the container platform is not configured to meet this requirement, this is a finding.
Fix: F-36000r600776_fix
Configure the container platform to transmit only encrypted FIPS-validated SHA-2 or later representations of passwords.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000173-CTR-000445
- Vuln IDs
-
- V-233097
- Rule IDs
-
- SV-233097r981862_rule
Checks: C-36033r600778_chk
Review the container platform configuration to determine if it enforces 24 hours/1 day as the minimum password lifetime. If the container platform does not enforce 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-36001r600779_fix
Configure the container platform to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000174-CTR-000450
- Vuln IDs
-
- V-233098
- Rule IDs
-
- SV-233098r981863_rule
Checks: C-36034r600781_chk
Review the container platform configuration to determine if it enforces a 60-day maximum password lifetime restriction. If the container platform does not enforce a 60-day maximum password lifetime restriction, this is a finding.
Fix: F-36002r600782_fix
Configure the container platform to enforce a 60-day maximum password lifetime restriction.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-CTR-000465
- Vuln IDs
-
- V-233101
- Rule IDs
-
- SV-233101r961044_rule
Checks: C-36037r600790_chk
Review documentation and configuration to ensure the container platform provides a PKI integration capability that meets DoD PKI infrastructure requirements. If the container platform is not configured to meet this requirement, this is a finding.
Fix: F-36005r600791_fix
Configure the container platform to utilize the DoD Enterprise PKI infrastructure.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- SRG-APP-000178-CTR-000470
- Vuln IDs
-
- V-233102
- Rule IDs
-
- SV-233102r961047_rule
Checks: C-36038r601736_chk
Review container platform documentation and configuration to determine if any interfaces that are provided for authentication purposes display the user's password when it is typed into the data entry field. If authentication information is not obfuscated when entered, this is a finding.
Fix: F-36006r600794_fix
Configure the container platform to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-APP-000181-CTR-000485
- Vuln IDs
-
- V-233105
- Rule IDs
-
- SV-233105r961056_rule
Checks: C-36041r601738_chk
Review the container platform configuration to determine if the container platform is configured to provide an audit reduction capability that supports on-demand reporting requirements. If the container platform is not configured to support on-demand reporting requirements, this is a finding.
Fix: F-36009r600803_fix
Configure the container platform to support on-demand reporting requirements.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- SRG-APP-000185-CTR-000490
- Vuln IDs
-
- V-233106
- Rule IDs
-
- SV-233106r961062_rule
Checks: C-36042r601740_chk
Review the container platform configuration to determine if the container platform is configured to employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions. If the container platform is not configured to employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions, this is a finding.
Fix: F-36010r600806_fix
Configure the container platform to employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SRG-APP-000190-CTR-000500
- Vuln IDs
-
- V-233108
- Rule IDs
-
- SV-233108r961068_rule
Checks: C-36044r810983_chk
Review documentation and configuration settings to determine if the container platform is configured to close user sessions after defined conditions or trigger events are met. If the container platform is not configured or cannot be configured to disconnect users after defined conditions and trigger events are met, this is a finding.
Fix: F-36012r810984_fix
Configure the container platform to terminate user sessions on defined conditions or trigger events.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-CTR-000530
- Vuln IDs
-
- V-233114
- Rule IDs
-
- SV-233114r961095_rule
Checks: C-36050r601742_chk
Review the container platform configuration to determine if management functionality is separated from user functionality. Validate that the separation is also implemented within the components by trying to execute management functions for each component as a user. If the container platform is not configured to separate management and user functionality or if component management and user functionality are not separated, this is a finding.
Fix: F-36018r600830_fix
Configure the container platform and its components to separate management and user functionality.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001184
- Version
- SRG-APP-000219-CTR-000550
- Vuln IDs
-
- V-233118
- Rule IDs
-
- SV-233118r961110_rule
Checks: C-36054r601744_chk
Review the container platform configuration to determine if FIPS-validated 140-2 or 140-3 cryptographic modules are being used to protect container images during transmission. If FIPS-validated 140-2 or 140-3 cryptographic modules are not being use, this is a finding.
Fix: F-36022r600842_fix
Configure the container platform to use FIPS-validated 140-2 or 140-3 cryptographic modules to protect container images during transmission.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-CTR-000570
- Vuln IDs
-
- V-233122
- Rule IDs
-
- SV-233122r961122_rule
Checks: C-36058r601746_chk
Review documentation and configuration to determine if the container platform runtime fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If the container platform runtime cannot be configured to fail securely, this is a finding.
Fix: F-36026r600854_fix
Configure the container platform runtime to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-APP-000226-CTR-000575
- Vuln IDs
-
- V-233123
- Rule IDs
-
- SV-233123r961125_rule
Checks: C-36059r600856_chk
Review the container platform configuration to determine if information necessary to determine the cause of a disruption or failure is preserved. If the information is not preserved, this is a finding.
Fix: F-36027r600857_fix
Configure the container platform to preserve information necessary to determine the cause of the disruption or failure.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-APP-000233-CTR-000585
- Vuln IDs
-
- V-233125
- Rule IDs
-
- SV-233125r961131_rule
Checks: C-36061r601750_chk
Verify container platform runtime configuration settings to determine whether container services used for security functions are located in an isolated security function such as a separate environment variables, labels, network segregation, and kernel groups. If security-related functions are not separate, this is a finding.
Fix: F-36029r600863_fix
Configure the container platform runtime to isolate security functions from non-security functions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-APP-000234-CTR-000590
- Vuln IDs
-
- V-233126
- Rule IDs
-
- SV-233126r971528_rule
Checks: C-36062r600865_chk
Review the container platform to determine if emergency accounts are automatically removed or disabled. If emergency accounts are automatically removed or disabled, this is a finding.
Fix: F-36030r600866_fix
Configure the container platform to never remove or disable emergency accounts.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-APP-000243-CTR-000595
- Vuln IDs
-
- V-233127
- Rule IDs
-
- SV-233127r961149_rule
Checks: C-36063r601752_chk
Review documentation and configuration to determine if the container platform disallows instantiation of containers trying to access host system privileged resources. If the container platform does not block containers requesting host system privileged resources, this is a finding.
Fix: F-36031r600869_fix
Configure the container platform to block instantiation of containers requesting access to host system-privileged resources.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-APP-000243-CTR-000600
- Vuln IDs
-
- V-233128
- Rule IDs
-
- SV-233128r961149_rule
Checks: C-36064r601754_chk
Review the container platform architecture documentation to find out if and how it protects the resources of one process or user (such as working memory, storage, host system kernel, network connections) from unauthorized access by another user or process. If the container platform configuration settings do not effectively implement these protections to prevent unauthorized access by another user or process, this is a finding.
Fix: F-36032r601862_fix
Deploy a container platform capable of effectively protecting the resources of one process or user from unauthorized access by another user or process. Configure the container platform to effectively protect the resources of one process or user from unauthorized access by another user or process. The container security solution should help the user understand where the code in the environment was deployed from, and provide controls that prevent deployment from untrusted sources or registries.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-APP-000246-CTR-000605
- Vuln IDs
-
- V-233129
- Rule IDs
-
- SV-233129r961152_rule
Checks: C-36065r601756_chk
Review the container platform implementation and security documentation and components settings to determine if the information system restricts the ability of users or systems to launch organization-defined DoS attacks against other information systems or networks from the container platform. If the container platform is not configured to restrict this ability, this is a finding.
Fix: F-36033r600875_fix
Configure the container platform to restrict the ability of users or other systems to launch DoS attacks from the container platform components by setting resource quotas on resources such as memory, storage, and CPU utilization.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-CTR-000625
- Vuln IDs
-
- V-233133
- Rule IDs
-
- SV-233133r961167_rule
Checks: C-36069r601758_chk
Review documentation and logs to determine if the container platform writes sensitive information such as passwords or private keys into the logs and administrative messages. If the container platform writes sensitive or potentially harmful information into the logs and administrative messages, this is a finding.
Fix: F-36037r600887_fix
Configure the container platform to not write sensitive information into the logs and administrative messages.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001496
- Version
- SRG-APP-000290-CTR-000670
- Vuln IDs
-
- V-233142
- Rule IDs
-
- SV-233142r961206_rule
Checks: C-36078r600913_chk
Review the container platform configuration to determine if the integrity of the audit tools is protected using cryptographic mechanisms. If audit tools are not protected through cryptographic mechanisms, this is a finding.
Fix: F-36046r600914_fix
Configure the container platform to use cryptographic mechanisms to protect the integrity of audit tools.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000291-CTR-000675
- Vuln IDs
-
- V-233143
- Rule IDs
-
- SV-233143r981871_rule
Checks: C-36079r981869_chk
Review the container platform configuration to determine if system administrators and ISSO are notified when accounts are created. If SAs and ISSO are not notified, this is a finding.
Fix: F-36047r981870_fix
Configure the container platform to notify SAs and ISSO when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000292-CTR-000680
- Vuln IDs
-
- V-233144
- Rule IDs
-
- SV-233144r981872_rule
Checks: C-36080r600919_chk
Review the container platform configuration to determine if system administrators and ISSO are notified when accounts are modified. If system administrators and ISSO are not notified, this is a finding.
Fix: F-36048r600920_fix
Configure the container platform to notify system administrators and ISSO when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000293-CTR-000685
- Vuln IDs
-
- V-233145
- Rule IDs
-
- SV-233145r981873_rule
Checks: C-36081r600922_chk
Review the container platform configuration to determine if system administrators and ISSO are notified when accounts are disabled. If system administrators and ISSO are not notified, this is a finding.
Fix: F-36049r600923_fix
Configure the container platform to notify system administrators and ISSO when accounts are disabled.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000294-CTR-000690
- Vuln IDs
-
- V-233146
- Rule IDs
-
- SV-233146r981874_rule
Checks: C-36082r600925_chk
Review the container platform configuration to determine if system administrators and ISSO are notified when accounts are removed. If system administrators and ISSO are not notified, this is a finding.
Fix: F-36050r600926_fix
Configure the container platform to notify system administrators and ISSO when accounts are removed.
- RMF Control
- AC-12
- Severity
- L
- CCI
- CCI-002364
- Version
- SRG-APP-000297-CTR-000705
- Vuln IDs
-
- V-233149
- Rule IDs
-
- SV-233149r961227_rule
Checks: C-36085r600934_chk
Review documentation and configuration settings to determine if the container platform displays a logout message. If the container platform does not display a logout message, this is a finding.
Fix: F-36053r600935_fix
Configure the container platform components to display an explicit logout message to users.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000317-CTR-000735
- Vuln IDs
-
- V-233155
- Rule IDs
-
- SV-233155r981875_rule
Checks: C-36091r600952_chk
Determine if the container platform is configured to terminate shared/group account credentials when members leave the group. If the container platform does not terminated shared/group account credentials when members leave the group, this is a finding.
Fix: F-36059r600953_fix
Configure the container platform to terminate shared/group account credentials when members leave the group.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-APP-000319-CTR-000745
- Vuln IDs
-
- V-233157
- Rule IDs
-
- SV-233157r961290_rule
Checks: C-36093r600958_chk
Determine if the container platform is configured to automatically audit account-enabling actions. If the container platform is not configured to automatically audit account-enabling actions, this is a finding.
Fix: F-36061r600959_fix
Configure the container platform to automatically audit account-enabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000320-CTR-000750
- Vuln IDs
-
- V-233158
- Rule IDs
-
- SV-233158r981878_rule
Checks: C-36094r981876_chk
Determine if the container platform is configured to notify system administrator and ISSO of account enabling actions. If the container platform is not configured to notify the SA and ISSO of account enabling actions, this is a finding.
Fix: F-36062r981877_fix
Configure the container platform to notify the SA and ISSO of account enabling actions.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-CTR-000770
- Vuln IDs
-
- V-233162
- Rule IDs
-
- SV-233162r961353_rule
Checks: C-36098r601762_chk
Review documentation to obtain the definition of the container platform functionality considered privileged in the context of the information system in question. Review the container platform security configuration and/or other means used to protect privileged functionality from unauthorized use. If the configuration does not protect all of the actions defined as privileged, this is a finding.
Fix: F-36066r600974_fix
Configure the container platform to security to protect all privileged functionality. Assigning roles that limit what actions a particular user can perform are the most common means of meeting this requirement.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- SRG-APP-000342-CTR-000775
- Vuln IDs
-
- V-233163
- Rule IDs
-
- SV-233163r961359_rule
Checks: C-36099r601764_chk
Review documentation and configuration to determine if the container platform disallows instantiation of containers trying to execute with more privileges than required or with privileged permissions. If the container platform does not block containers requesting privileged permissions, privilege escalation, or allows containers to have more privileges than required, this is a finding.
Fix: F-36067r600977_fix
Configure the container platform to block instantiation with no more privileges than necessary.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-APP-000343-CTR-000780
- Vuln IDs
-
- V-233164
- Rule IDs
-
- SV-233164r961362_rule
Checks: C-36100r600979_chk
Review container platform documentation and log configuration to verify the application server logs privileged activity. If the container platform is not configured to log privileged activity, this is a finding.
Fix: F-36068r600980_fix
Configure the container platform to log privileged activity.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-CTR-000785
- Vuln IDs
-
- V-233165
- Rule IDs
-
- SV-233165r961368_rule
Checks: C-36101r601766_chk
Determine if the container platform is configured to automatically lock an account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded. If the container platform is not configured to lock the account, this is a finding.
Fix: F-36069r600983_fix
Configure the container platform to automatically lock an account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-CTR-000790
- Vuln IDs
-
- V-233166
- Rule IDs
-
- SV-233166r961863_rule
Checks: C-36102r601768_chk
Review documentation and configuration setting. If the container platform does not provide the ability for users in authorized roles to reconfigure auditing at any time of the user's choosing, this is a finding. If changes in audit configuration cannot take effect until after a certain time or date, or until some event, such as a server restart, has occurred, and if that time or event does not meet the requirements specified by the organization, this is a finding.
Fix: F-36070r601868_fix
Deploy a container platform that provides the ability for users in authorized roles to reconfigure auditing at any time. Deploy a container platform that allows audit configuration changes to take effect within the timeframe required by the organization and without involving actions or events that the organization rules unacceptable.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-CTR-000800
- Vuln IDs
-
- V-233168
- Rule IDs
-
- SV-233168r961392_rule
Checks: C-36104r601781_chk
Review the container platform configuration to determine if audit record storage capacity is allocated in accordance with organization-defined audit record storage requirements. If audit record storage capacity is not allocated in accordance with organization-defined audit record storage requirements, this is a finding.
Fix: F-36072r600992_fix
Configure the container platform to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-CTR-000805
- Vuln IDs
-
- V-233169
- Rule IDs
-
- SV-233169r961395_rule
Checks: C-36105r601783_chk
Verify the log records are being off-loaded to a separate system or transferred from the container platform storage location to a storage location other than the container platform itself. The information system may demonstrate this capability using a log management application, system configuration, or other means. If logs are not being off-loaded, this is a finding.
Fix: F-36073r600995_fix
Configure the container platform to off-load the logs to a remote log or management server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-CTR-000810
- Vuln IDs
-
- V-233170
- Rule IDs
-
- SV-233170r961398_rule
Checks: C-36106r601785_chk
Review the container platform configuration to determine if it is configured to provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity. If the container platform is not configured to provide an immediate real-time alert, this is a finding.
Fix: F-36074r600998_fix
Configure the container platform to provide an immediate real-time alert to the SA and ISSO when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-CTR-000815
- Vuln IDs
-
- V-233171
- Rule IDs
-
- SV-233171r961401_rule
Checks: C-36107r601787_chk
Review the container platform configuration to determine if it is configured to provide an immediate real-time alert to the SA and ISSO of all audit failure events requiring real-time alerts. If the container platform is not configured to provide an immediate real-time alert, this is a finding.
Fix: F-36075r601001_fix
Configure the container platform to provide an immediate real-time alert to the SA and ISSO of all audit failure events requiring real-time alerts.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-CTR-000865
- Vuln IDs
-
- V-233181
- Rule IDs
-
- SV-233181r961443_rule
Checks: C-36117r601030_chk
Review the container platform documentation and configuration files to determine if time stamps for log records can be mapped to UTC or GMT or local time that offsets from UTC. If the time stamp cannot be mapped to UTC or GMT, this is a finding.
Fix: F-36085r601031_fix
Configure the container platform to use UTC or GMT or local time that offset from UTC based time stamps for log records.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-CTR-000870
- Vuln IDs
-
- V-233182
- Rule IDs
-
- SV-233182r961446_rule
Checks: C-36118r601033_chk
Review the container platform documentation and configuration files to determine if time stamps for log records meet a granularity of one second. If the time stamp cannot generate to a one-second granularity, this is a finding.
Fix: F-36086r601034_fix
Configure the container platform to use time stamps for log records that can meet a granularity of one second.
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- SRG-APP-000378-CTR-000880
- Vuln IDs
-
- V-233184
- Rule IDs
-
- SV-233184r981884_rule
Checks: C-36120r981883_chk
Review the container platform configuration to determine if patches and updates can only be installed through accounts with privileged status. Attempt to install a patch or upgrade using a nonprivileged user account. If patches or updates can be installed using a nonprivileged account or the container platform is not configured to stop the installation using a nonprivileged account, this is a finding.
Fix: F-36088r601040_fix
Configure the container platform to only allow patch installation and upgrades using privileged accounts.
- RMF Control
- Severity
- H
- CCI
- CCI-003980
- Version
- SRG-APP-000378-CTR-000885
- Vuln IDs
-
- V-233185
- Rule IDs
-
- SV-233185r981885_rule
Checks: C-36121r601791_chk
Review the container platform runtime configuration to determine if only accounts given specific container instantiation privileges can execute the container image instantiation process. Attempt to instantiate a container image using an account that does not have the proper privileges to execute the process. If container images can be instantiated using an account without the proper privileges, this is a finding.
Fix: F-36089r601043_fix
Configure the container platform runtime to prohibit the instantiation of container images without explicit container image instantiation privileges given to users.
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- SRG-APP-000378-CTR-000890
- Vuln IDs
-
- V-233186
- Rule IDs
-
- SV-233186r981888_rule
Checks: C-36122r981886_chk
Review container platform registry security settings with respect to nonadministrative users' ability to create, alter, or replace container images. If any such permissions exist and are not documented and approved, this is a finding.
Fix: F-36090r981887_fix
Document and obtain approval for any nonadministrative users who require the ability to create, alter, or replace container images within the container platform registry. Implement the approved permissions. Revoke any unapproved permissions.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-CTR-000900
- Vuln IDs
-
- V-233188
- Rule IDs
-
- SV-233188r961461_rule
Checks: C-36124r601793_chk
Review documentation and configuration settings to determine if the container platform enforces access restrictions associated with changes to container platform components configuration. If the container platform does not enforce such access restrictions, this is a finding.
Fix: F-36092r601880_fix
Configure the container platform to enforce access restrictions associated with changes to the container platform components configuration.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- SRG-APP-000381-CTR-000905
- Vuln IDs
-
- V-233189
- Rule IDs
-
- SV-233189r981889_rule
Checks: C-36125r601054_chk
Review container platform documentation and logs to determine if enforcement actions used to restrict access associated with changes to the container platform are logged. If these actions are not logged, this is a finding.
Fix: F-36093r601055_fix
Configure the container platform to log the enforcement actions used to restrict access associated with changes.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- SRG-APP-000383-CTR-000910
- Vuln IDs
-
- V-233190
- Rule IDs
-
- SV-233190r961470_rule
Checks: C-36126r601057_chk
Review the container platform configuration to determine if services or capabilities presently on the information system are required for operational or mission needs. If additional services or capabilities are present on the system, this is a finding.
Fix: F-36094r601058_fix
Configure the container platform to only utilize secure ports and protocols required for operation that have been accepted for use as per the Ports, Protocols, and Services Category Assignments List (CAL) from DISA (PPSM).
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- SRG-APP-000384-CTR-000915
- Vuln IDs
-
- V-233191
- Rule IDs
-
- SV-233191r961473_rule
Checks: C-36127r601795_chk
Review documentation and configuration setting to determine if policies, rules, or restrictions exist regarding usage of container platform components. If no such no restrictions are in place, this is not a finding. Identify any components the organization requires to be disabled or removed and configure the container platform according to that policy. If the container platform components are not disabled or removed according to the organization's policy, this is a finding.
Fix: F-36095r601061_fix
Configure the container platform so that any platform components that are not required in order to meet the organization's mission are disabled or removed. Document the components that must be disabled or removed for reference.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001774
- Version
- SRG-APP-000386-CTR-000920
- Vuln IDs
-
- V-233192
- Rule IDs
-
- SV-233192r961479_rule
Checks: C-36128r601797_chk
Review documentation and configuration settings to identify if the container platform whitelisting specifies which container platform components are allowed to execute. Check for the existence of policy settings or policy files that can be configured to restrict container platform component execution. Demonstrate how the program execution is restricted. Look for a deny-all, permit-by-exception policy of restriction. Some methods for restricting execution include but are not limited to the use of custom capabilities built into the application or Software Restriction Policies, Application Security Manager, or Role-Based Access Controls (RBAC). If container platform whitelisting is not utilized or does not follow a deny-all, permit-by-exception (whitelist) policy, this is a finding.
Fix: F-36096r601064_fix
Configure the container platform to utilize a deny-all, permit-by-exception policy when allowing the execution of authorized software.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-CTR-000935
- Vuln IDs
-
- V-233195
- Rule IDs
-
- SV-233195r961494_rule
Checks: C-36131r601072_chk
Review documentation and configuration to ensure the container platform is configured to use an approved DoD multifactor token (CAC) when accessing platform via user interfaces. If multifactor authentication is not configured, this is a finding.
Fix: F-36099r601073_fix
Configure the container platform to accept standard DoD multifactor token-based credentials when users interface with the platform.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-CTR-000960
- Vuln IDs
-
- V-233200
- Rule IDs
-
- SV-233200r961521_rule
Checks: C-36136r601803_chk
Review the container platform configuration to determine if the platform is configured to prohibit the use of cached authenticators after an organization-defined time period. If the container platform is not configured to prohibit the use of cached authenticators after an organization-defined time period, this is a finding.
Fix: F-36104r601088_fix
Configure the container platform to prohibit the use of cached authenticators after an organization-defined time period.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-APP-000401-CTR-000965
- Vuln IDs
-
- V-233201
- Rule IDs
-
- SV-233201r981893_rule
Checks: C-36137r601805_chk
Review the container platform configuration. If the container platform is not implemented to use a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network, this is a finding.
Fix: F-36105r601091_fix
Configure the container platform to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002009
- Version
- SRG-APP-000402-CTR-000970
- Vuln IDs
-
- V-233202
- Rule IDs
-
- SV-233202r961527_rule
Checks: C-36138r601093_chk
Review the documentation and configuration to determine if the container platform accepts PIV credentials from other federal agencies. If the container platform does not accept other federal agency PIV credentials, this is a finding.
Fix: F-36106r601094_fix
Configure the container platform to accept PIV credentials from other federal agencies.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- SRG-APP-000409-CTR-000990
- Vuln IDs
-
- V-233206
- Rule IDs
-
- SV-233206r961548_rule
Checks: C-36142r601807_chk
Review the container platform to verify if the platform is auditing non-local maintenance and diagnostic sessions' organization-defined audit events. If the container platform is not auditing non-local maintenance and diagnostic sessions' organization-defined audit events, this is a finding.
Fix: F-36110r601106_fix
Configure the container platform to audit non-local maintenance and diagnostic sessions' organization-defined audit events.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- SRG-APP-000411-CTR-000995
- Vuln IDs
-
- V-233207
- Rule IDs
-
- SV-233207r961554_rule
Checks: C-36143r601809_chk
Validate that container platform applications and APIs used for nonlocal maintenance sessions are using FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications. If the sessions are not using FIPS-validated HMAC, this is a finding.
Fix: F-36111r601109_fix
Configure the container platform applications and APIs used for nonlocal maintenance sessions to use FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-003123
- Version
- SRG-APP-000412-CTR-001000
- Vuln IDs
-
- V-233208
- Rule IDs
-
- SV-233208r961557_rule
Checks: C-36144r855392_chk
Validate the container platform web management tools and Application Program Interfaces (API) are configured to use FIPS-validated Advanced Encryption Standard (AES) cipher block algorithms to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions. If the web management tools and API are not configured to use FIPS-validated Advanced Encryption Standard (AES) cipher block algorithms, this is a finding.
Fix: F-36112r878094_fix
Configure the container platform web management tools and Application Program Interfaces (API) with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.
- RMF Control
- RA-5
- Severity
- M
- CCI
- CCI-001067
- Version
- SRG-APP-000414-CTR-001010
- Vuln IDs
-
- V-233210
- Rule IDs
-
- SV-233210r961563_rule
Checks: C-36146r601117_chk
Validate that scanning applications have privileged access to container platform components, containers, and container images to properly perform vulnerability scans. If privileged access is not given to the scanning application, this is a finding.
Fix: F-36114r601118_fix
Configure the vulnerability scanning application to have privileged access to the container platform components, containers, and container images.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-CTR-001015
- Vuln IDs
-
- V-233211
- Rule IDs
-
- SV-233211r961863_rule
Checks: C-36147r601811_chk
Review documentation to verify that the container platform is using NSA-approved cryptography to protect classified data and applications. If the container platform is not using NSA-approved cryptography for classified data and applications, this is a finding.
Fix: F-36115r601121_fix
Configure the container platform to utilize NSA-approved cryptography to protect classified information.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-CTR-001060
- Vuln IDs
-
- V-233220
- Rule IDs
-
- SV-233220r961602_rule
Checks: C-36156r601147_chk
Review container platform keystore documentation and configuration to verify encryption levels meet the information sensitivity level. If the container platform keystore encryption configuration does not meet system requirements, this is a finding.
Fix: F-36124r601148_fix
Configure the container platform keystore encryption to maintain the confidentiality and integrity of information for applicable sensitivity level.
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- SRG-APP-000431-CTR-001065
- Vuln IDs
-
- V-233221
- Rule IDs
-
- SV-233221r961608_rule
Checks: C-36157r601813_chk
Review container platform runtime documentation and configuration is maintaining a separate execution domain for each executing process. Different groups of applications, and services with different security needs, should be deployed in separate namespaces as a first level of isolation. If container platform runtime is not configured to execute processes in separate domains and namespaces, this is a finding. If namespaces use defaults, this is a finding.
Fix: F-36125r601151_fix
Deploy a container platform runtime capable of maintaining a separate execution domain and namespace for each executing process. Create a namespace for each containers, defining them as logical groups.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-CTR-001070
- Vuln IDs
-
- V-233222
- Rule IDs
-
- SV-233222r961620_rule
Checks: C-36158r601815_chk
Review documentation and configuration to determine if the container platform can protect against or limit the effects of all types of DoS attacks by employing defined security safeguards against resource depletion. Examples of resource limits are on memory, storage, and CPU. If the container platform cannot be configured to protect against or limit the effects of all types of DoS, this is a finding.
Fix: F-36126r601154_fix
Configure the container platform to protect against or limit the effects of all types of DoS attacks by employing defined security safeguards. Safeguards such as resource limits on memory, storage, and CPU can be used.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-APP-000439-CTR-001080
- Vuln IDs
-
- V-233224
- Rule IDs
-
- SV-233224r961632_rule
Checks: C-36160r810986_chk
Review container platform configuration to determine if it is using a transmission method that maintains the confidentiality and integrity of information during transmission. If a transmission method is not being used that maintains the confidentiality and integrity of the data, this is a finding.
Fix: F-36128r810987_fix
Configure the container platform to utilize a transmission method that maintains the confidentiality and integrity of information during transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-CTR-001090
- Vuln IDs
-
- V-233226
- Rule IDs
-
- SV-233226r961638_rule
Checks: C-36162r601817_chk
Review the documentation and deployed configuration to determine if the container platform maintains the confidentiality and integrity of information during preparation before transmission. If the confidentiality and integrity are not maintained using mechanisms such as TLS, TLS VPNs, or IPsec during preparation before transmission, this is a finding.
Fix: F-36130r601166_fix
Configure the container platform to maintain the confidentiality and integrity of information using mechanisms such as TLS, TLS VPNs, or IPsec during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-CTR-001095
- Vuln IDs
-
- V-233227
- Rule IDs
-
- SV-233227r961641_rule
Checks: C-36163r601819_chk
Review documentation and configuration settings to determine if the container platform maintains the confidentiality and integrity of information during reception. If confidentiality and integrity are not maintained using mechanisms such as TLS, TLS VPNs, or IPsec during reception, this is a finding.
Fix: F-36131r601169_fix
Configure the container platform to maintain the confidentiality and integrity using mechanisms such as TLS, TLS VPNs, or IPsec during reception.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-APP-000447-CTR-001100
- Vuln IDs
-
- V-233228
- Rule IDs
-
- SV-233228r961656_rule
Checks: C-36164r601821_chk
Review the configuration to determine if the container platform behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If the container platform does not meet this requirement, this is a finding.
Fix: F-36132r601172_fix
Configure the container platform behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SRG-APP-000450-CTR-001105
- Vuln IDs
-
- V-233229
- Rule IDs
-
- SV-233229r961665_rule
Checks: C-36165r601174_chk
Review the container platform configuration to determine if safeguards are in place to protect the system memory and CPU from resource depletion and unauthorized execution. If safeguards are not in place, this is a finding.
Fix: F-36133r601175_fix
Configure the container platform to have safeguards in place to protect the system memory and CPU from resource depletion and unauthorized code execution.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-APP-000454-CTR-001110
- Vuln IDs
-
- V-233230
- Rule IDs
-
- SV-233230r961677_rule
Checks: C-36166r601823_chk
Review container platform registry documentation and configuration to determine if organization-defined images contains latest approved vendor software image version. If organization-defined images do not contain the latest approved vendor software image version, this is a finding. Review container platform registry documentation and configuration to determine if organization-defined images are removed after updated versions have been installed. If organization-defined images are not removed after updated versions have been installed, this is a finding. Review container platform runtime documentation and configuration to determine if organization-define images are executing latest image version from the container platform registry. If container platform runtime is not executing latest organization-defined images from the container platform registry, this is a finding.
Fix: F-36134r878097_fix
Configure the container platform registry to update organization-defined images with current approved vendor version and remove obsolete images after updated versions have been installed. Configure the container platform runtime to execute latest organization-defined images from the container platform registry.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-APP-000454-CTR-001115
- Vuln IDs
-
- V-233231
- Rule IDs
-
- SV-233231r961677_rule
Checks: C-36167r601825_chk
Review container platform registry documentation and configuration to determine if organization-defined images contains latest approved vendor software image version. If organization-defined images do not contain the latest approved vendor software image version, this is a finding. Review container platform registry documentation and configuration to determine if organization-defined images are removed after updated versions have been installed. If organization-defined images are not removed after updated versions have been installed, this is a finding. Review container platform runtime documentation and configuration to determine if organization-defined images are executing latest image version from the container registry. If container platform runtime is not executing latest organization-defined images from the container platform registry, this is a finding.
Fix: F-36135r878099_fix
Configure the container platform registry to update organization-defined images with current approved vendor version and remove obsolete images after updated versions have been installed. Configure the container platform runtime to execute latest organization-defined images from the container platform registry.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-CTR-001125
- Vuln IDs
-
- V-233233
- Rule IDs
-
- SV-233233r961683_rule
Checks: C-36169r601827_chk
Review documentation and configuration to determine if the container platform registry inspects and contains approved vendor repository latest images containing security-relevant updates within a timeframe directed by an authoritative source (IAVM, CTOs, DTMs, STIGs, etc.). If the container platform registry does not contain the latest image with security-relevant updates within the time period directed by the authoritative source, this is a finding. The container platform registry should help the user understand where the code in the environment was deployed from, and must provide controls that prevent deployment from untrusted sources or registries.
Fix: F-36137r601187_fix
Configure the container platform registry to use approved vendor repository to ensure latest images containing security-relevant updates are installed.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-CTR-001130
- Vuln IDs
-
- V-233234
- Rule IDs
-
- SV-233234r961683_rule
Checks: C-36170r601829_chk
Review documentation and configuration to determine if the container platform registry inspects and contains approved vendor repository latest images containing security-relevant updates within a timeframe directed by an authoritative source (IAVM, CTOs, DTMs, STIGs, etc.). If the container platform registry does not contain the latest image with security-relevant updates within the time period directed by the authoritative source, this is a finding. The container platform registry should help the user understand where the code in the environment was deployed from and must provide controls that prevent deployment from untrusted sources or registries.
Fix: F-36138r601190_fix
Configure the container platform registry to use approved vendor repository to ensure latest images containing security-relevant updates are installed within the time period directed by the authoritative source.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002696
- Version
- SRG-APP-000472-CTR-001170
- Vuln IDs
-
- V-233242
- Rule IDs
-
- SV-233242r961731_rule
Checks: C-36178r601831_chk
Review container platform documentation and configuration verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM). If verification of the correct operation of security functions is not performed, this is a finding.
Fix: F-36146r601214_fix
Configure the container platform configuration and installation settings to perform verification of the correct operation of security functions.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002699
- Version
- SRG-APP-000473-CTR-001175
- Vuln IDs
-
- V-233243
- Rule IDs
-
- SV-233243r961734_rule
Checks: C-36179r855429_chk
Review container platform documentation. Verify that the container platform is configured to perform verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM), upon product startup/restart, by a user with privileged access, and/or every 30 days. If it is not, this is a finding.
Fix: F-36147r601217_fix
Configure the container platform to perform verification of the correct operation of security functions, which may include the connection validation, upon product startup/restart, or by a user with privileged access, and/or every 30 days.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002702
- Version
- SRG-APP-000474-CTR-001180
- Vuln IDs
-
- V-233244
- Rule IDs
-
- SV-233244r961737_rule
Checks: C-36180r855431_chk
Review container platform runtime documentation and configuration settings. If the container platform is not configured to notify organization-defined information system role when anomalies in the operation of security functions as defined by site security plan are discovered, this is a finding.
Fix: F-36148r601220_fix
Configure the container platform runtime to notify system administrator and operation staff when anomalies in the operation of the security functions as defined in site security plan are discovered.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000492-CTR-001220
- Vuln IDs
-
- V-233252
- Rule IDs
-
- SV-233252r961791_rule
Checks: C-36188r601243_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to access security objects. If audit records are not generated, this is a finding.
Fix: F-36156r601244_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts to access security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000493-CTR-001225
- Vuln IDs
-
- V-233253
- Rule IDs
-
- SV-233253r961794_rule
Checks: C-36189r601246_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to access security levels. If audit records are not generated, this is a finding.
Fix: F-36157r601247_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts to access security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000494-CTR-001230
- Vuln IDs
-
- V-233254
- Rule IDs
-
- SV-233254r961797_rule
Checks: C-36190r601249_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to access categories of information. If audit records are not generated, this is a finding.
Fix: F-36158r601250_fix
Configure the container platform to generate audit records on successful/unsuccessful attempts to access categories of information.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-CTR-001235
- Vuln IDs
-
- V-233255
- Rule IDs
-
- SV-233255r961800_rule
Checks: C-36191r601252_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to modify privileges. If audit records are not generated, this is a finding.
Fix: F-36159r601253_fix
Configure the container platform to generate audit records on successful/unsuccessful attempts to modify privileges.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000496-CTR-001240
- Vuln IDs
-
- V-233256
- Rule IDs
-
- SV-233256r961803_rule
Checks: C-36192r601255_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to modify security objects. If audit records are not generated, this is a finding.
Fix: F-36160r601256_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts to modify security objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000497-CTR-001245
- Vuln IDs
-
- V-233257
- Rule IDs
-
- SV-233257r961806_rule
Checks: C-36193r601258_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to modify security levels. If audit records are not generated, this is a finding.
Fix: F-36161r601259_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts to modify security levels.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000498-CTR-001250
- Vuln IDs
-
- V-233258
- Rule IDs
-
- SV-233258r961809_rule
Checks: C-36194r601261_chk
Review the container platform configuration to verify audit records are generated when successful/unsuccessful attempts are made to modify categories of information. If audit records are not generated, this is a finding.
Fix: F-36162r601262_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts are made to modify categories of information.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-CTR-001255
- Vuln IDs
-
- V-233259
- Rule IDs
-
- SV-233259r961812_rule
Checks: C-36195r601264_chk
Review the container platform configuration to verify audit records are generated when successful/unsuccessful attempts are made to delete privileges. If audit records are not generated, this is a finding.
Fix: F-36163r601265_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts are made to delete privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000500-CTR-001260
- Vuln IDs
-
- V-233260
- Rule IDs
-
- SV-233260r961815_rule
Checks: C-36196r601267_chk
Review the container platform configuration to verify audit records are generated on successful/unsuccessful attempts to delete security levels. If audit records are not generated, this is a finding.
Fix: F-36164r601268_fix
Configure the container platform to generate audit records when successful/unsuccessful attempts to delete security levels.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000501-CTR-001265
- Vuln IDs
-
- V-233261
- Rule IDs
-
- SV-233261r961818_rule
Checks: C-36197r601270_chk
Review the container platform configuration to determine if audit records are generated on successful/unsuccessful attempts to delete security objects occur. If audit records are not generated, this is a finding.
Fix: F-36165r601271_fix
Configure the container platform to generate audit records on successful/unsuccessful attempts to delete security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000502-CTR-001270
- Vuln IDs
-
- V-233262
- Rule IDs
-
- SV-233262r961821_rule
Checks: C-36198r601273_chk
Review the container platform configuration to determine if audit records are generated on successful/unsuccessful attempts to delete categories of information occur. If audit records are not generated, this is a finding.
Fix: F-36166r601274_fix
Configure the container platform to generate audit records on successful/unsuccessful attempts to delete categories of information occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-CTR-001275
- Vuln IDs
-
- V-233263
- Rule IDs
-
- SV-233263r961824_rule
Checks: C-36199r601882_chk
Review the container platform configuration for audit logon events. Ensure audit policy for successful and unsuccessful logon events are enabled. Verify events are written to the log. Validate system documentation is current. If logon attempts do not generate log records, this is a finding.
Fix: F-36167r601277_fix
Configure the container platform registry, keystore, and runtime to generate audit log for successful and unsuccessful logon for any all accounts and services. Revise all applicable system documentation.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-CTR-001280
- Vuln IDs
-
- V-233264
- Rule IDs
-
- SV-233264r961827_rule
Checks: C-36200r601279_chk
Review the documentation and configuration guides to determine if the container platform generates log records for privileged activities. If log records are not generated for privileged activities, this is a finding.
Fix: F-36168r601280_fix
Configure the container platform to generate log records for privileged activities.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-CTR-001285
- Vuln IDs
-
- V-233265
- Rule IDs
-
- SV-233265r961830_rule
Checks: C-36201r601839_chk
Review the container platform configuration for audit user access start and end times. Ensure audit policy for user access start and end times are enabled. Verify events are written to the log. Validate system documentation is current. If user access start and end times do not generate log records, this is a finding.
Fix: F-36169r601283_fix
Configure the container platform to generate audit log for user access start and end times for any all accounts and services. Revise all applicable system documentation.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-CTR-001290
- Vuln IDs
-
- V-233266
- Rule IDs
-
- SV-233266r961833_rule
Checks: C-36202r601841_chk
Review the container platform configuration for audit logon events. Ensure audit policy for concurrent logons from different workstations and systems is enabled. Verify events are written to the log. Validate system documentation is current. If concurrent logons from different workstations and systems do not generate log records, this is a finding.
Fix: F-36170r601286_fix
Configure the container platform to generate audit log for concurrent logins from multiple workstations and systems. Revise all applicable system documentation.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000507-CTR-001295
- Vuln IDs
-
- V-233267
- Rule IDs
-
- SV-233267r961836_rule
Checks: C-36203r601884_chk
Review the container platform configuration to verify that the runtime generates audit records on successful/unsuccessful access to objects. If audit records are not generated by the runtime when objects are successfully/unsuccessfully accessed, this is a finding.
Fix: F-36171r601289_fix
Configure the container platform runtime to generate audit records on successful/unsuccessful access to objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000508-CTR-001300
- Vuln IDs
-
- V-233268
- Rule IDs
-
- SV-233268r961839_rule
Checks: C-36204r601291_chk
Review the container platform configuration to determine if direct access of the container platform generates audit records. If audit records are not generated, this is a finding.
Fix: F-36172r601292_fix
Configure the container platform to generate audit records when accessed directly.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000509-CTR-001305
- Vuln IDs
-
- V-233269
- Rule IDs
-
- SV-233269r961842_rule
Checks: C-36205r601885_chk
Review the container platform configuration to determine if the container platform is configured to generate audit records for all account creations, modifications, disabling, and termination events. If the container platform is not configured to generate the audit records, this is a finding.
Fix: F-36173r601295_fix
Configure the container platform to generate audit records for all account creations, modifications, disabling, and termination events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000510-CTR-001310
- Vuln IDs
-
- V-233270
- Rule IDs
-
- SV-233270r961845_rule
Checks: C-36206r601847_chk
Review the container runtime configuration to validate audit record generation for container execution, shutdown, and restart events. If the container runtime does not generate records for container execution, shutdown and restart events, this is a finding.
Fix: F-36174r601298_fix
Configure the container runtime to generate audit records for container execution, shutdown, and restart events.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-CTR-001315
- Vuln IDs
-
- V-233271
- Rule IDs
-
- SV-233271r961857_rule
Checks: C-36207r855440_chk
Review the container platform configuration to validate that valid FIPS 140-2 approved cryptographic modules are being used to generate hashes. If non-valid or unapproved FIPS 140-2 cryptographic modules are being used to generate hashes, this is a finding.
Fix: F-36175r601301_fix
Configure the container platform to use valid FIPS 140-2 approved cryptographic modules to generate hashes.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-CTR-001325
- Vuln IDs
-
- V-233273
- Rule IDs
-
- SV-233273r961863_rule
Checks: C-36209r601851_chk
Review the container platform configuration to determine the services offered by the container platform and validate that any services that are offered are configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs. If container platform services are not configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs, this is a finding.
Fix: F-36177r601307_fix
Configure container services in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-CTR-001330
- Vuln IDs
-
- V-233274
- Rule IDs
-
- SV-233274r961863_rule
Checks: C-36210r601887_chk
Review the container platform configuration and documentation to determine if the platform is configured to store and instantiate industry standard container images. If the container platform cannot instantiate industry standard container images, this is a finding.
Fix: F-36178r601310_fix
Enable the container platform to store and instantiate industry standard container image formats.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-CTR-001335
- Vuln IDs
-
- V-233275
- Rule IDs
-
- SV-233275r961863_rule
Checks: C-36211r601312_chk
Review the container platform to validate continuous vulnerability scans of components, containers, and container images are being performed. If continuous vulnerability scans are not being performed, this is a finding.
Fix: F-36179r601313_fix
Implement continuous vulnerability scans of container platform components, containers, and container images either by the container platform or from external vulnerability scanning applications.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-APP-000560-CTR-001340
- Vuln IDs
-
- V-233276
- Rule IDs
-
- SV-233276r961869_rule
Checks: C-36212r601315_chk
Review the container platform configuration to determine if TLS versions 1.0 and 1.1, SSL 2.0 and 3.0 are prohibited for communication. If communication using TLS versions 1.0 and 1.1, SSL 2.0 and 3.0 is permitted, this is a finding.
Fix: F-36180r601316_fix
Configure the container platform to prohibit communication using TLS versions 1.0 and 1.1, SSL 2.0 and 3.0.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000605-CTR-001380
- Vuln IDs
-
- V-233284
- Rule IDs
-
- SV-233284r961893_rule
Checks: C-36220r601855_chk
Review the container platform configuration to verify the container platform is validating certificates used for Transport Layer Security (TLS) functions by performing a RFC 5280-compliant certification path validation and that self-signed certificates are not being used. If the container platform is not validating certificates used for TLS functions by performing an RFC 5280-compliant certification path validation, this is a finding. If self-signed certificates are in use, this is a finding.
Fix: F-36188r601340_fix
Configure the container platform to validate certificates used for Transport Layer Security (TLS) functions by performing an RFC 5280-compliant certification path validation and to disable the use of self-signed certificates.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000610-CTR-001385
- Vuln IDs
-
- V-233285
- Rule IDs
-
- SV-233285r961896_rule
Checks: C-36221r601857_chk
Review the container platform configuration to validate that a FIPS-validated SHA-2 or higher hash function is being used for digital signature generation and verification. If a FIPS-validated SHA-2 or higher hash function is not being used for digital signature generation and verification, this is a finding.
Fix: F-36189r601343_fix
Configure the container platform to use a FIPS-validated SHA-2 or higher hash function for digital signature generation and verification.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-APP-000635-CTR-001405
- Vuln IDs
-
- V-233289
- Rule IDs
-
- SV-233289r961908_rule
Checks: C-36225r601354_chk
Review the container platform configuration to ensure FIPS-validated cryptographic modules are implemented to encrypt unclassified information requiring confidentiality. If FIPS-validated cryptographic modules are not being used, this is a finding.
Fix: F-36193r601355_fix
Configure the container platform to use FIPS-validated cryptographic modules to encrypt unclassified information requiring confidentiality.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- SRG-APP-000645-CTR-001410
- Vuln IDs
-
- V-233290
- Rule IDs
-
- SV-233290r961911_rule
Checks: C-36226r601859_chk
Review the container platform configuration to verify that container platform is not using protocols that transmit authentication data unencrypted and that the container platform is not using flawed cryptographic algorithms for transmission. If the container platform is using protocols to transmit authentication data unencrypted or is using flawed cryptographic algorithms, this is a finding.
Fix: F-36194r601358_fix
Configure the container platform to use protocols that transmit authentication data encrypted and to use cryptographic algorithms that are not flawed.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002145
- Version
- SRG-APP-000318-CTR-000740
- Vuln IDs
-
- V-257291
- Rule IDs
-
- SV-257291r961287_rule
Checks: C-60975r919159_chk
Determine if the container platform is configured to enforce organization-defined circumstances and/or usage conditions for organization-defined accounts. If the container platform does not enforce organization-defined circumstances and/or usage conditions for organization-defined accounts, this is a finding.
Fix: F-60902r919160_fix
Configure the container platform to enforce organization-defined circumstances and/or usage conditions for organization-defined accounts.
- RMF Control
- Severity
- M
- CCI
- CCI-003628
- Version
- SRG-APP-000705-CTR-000110
- Vuln IDs
-
- V-263586
- Rule IDs
-
- SV-263586r982453_rule
Checks: C-67486r982452_chk
Verify the container platform is configured to disable accounts when the accounts are no longer associated to a user. If the container platform is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Fix: F-67394r981897_fix
Configure the container platform to disable accounts when the accounts are no longer associated to a user.
- RMF Control
- Severity
- M
- CCI
- CCI-003821
- Version
- SRG-APP-000745-CTR-000120
- Vuln IDs
-
- V-263587
- Rule IDs
-
- SV-263587r982455_rule
Checks: C-67487r982454_chk
Verify the container platform is configured to implement the capability to centrally review and analyze audit records from multiple components within the system. If the container platform is not configured to implement the capability to centrally review and analyze audit records from multiple components within the system, this is a finding.
Fix: F-67395r981900_fix
Configure the container platform to implement the capability to centrally review and analyze audit records from multiple components within the system.
- RMF Control
- Severity
- M
- CCI
- CCI-003831
- Version
- SRG-APP-000795-CTR-000130
- Vuln IDs
-
- V-263588
- Rule IDs
-
- SV-263588r982457_rule
Checks: C-67488r982456_chk
Verify the container platform is configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information. If the container platform is not configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information, this is a finding.
Fix: F-67396r981903_fix
Configure the container platform to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-APP-000820-CTR-000170
- Vuln IDs
-
- V-263589
- Rule IDs
-
- SV-263589r981907_rule
Checks: C-67489r981905_chk
Verify the container platform is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the container platform is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-67397r981906_fix
Configure the container platform to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- Severity
- M
- CCI
- CCI-004047
- Version
- SRG-APP-000825-CTR-000180
- Vuln IDs
-
- V-263590
- Rule IDs
-
- SV-263590r981910_rule
Checks: C-67490r981908_chk
Verify the container platform is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. If the container platform is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements, this is a finding.
Fix: F-67398r981909_fix
Configure the container platform to implement multi-factor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- RMF Control
- Severity
- M
- CCI
- CCI-004058
- Version
- SRG-APP-000830-CTR-000190
- Vuln IDs
-
- V-263591
- Rule IDs
-
- SV-263591r981913_rule
Checks: C-67491r981911_chk
Verify the container platform is configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency. If the container platform is not configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency, this is a finding.
Fix: F-67399r981912_fix
Configure the container platform to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004059
- Version
- SRG-APP-000835-CTR-000200
- Vuln IDs
-
- V-263592
- Rule IDs
-
- SV-263592r982459_rule
Checks: C-67492r982458_chk
Verify the container platform is configured to update the list of passwords on an organization-defined frequency. If the container platform is not configured to update the list of passwords on an organization-defined frequency, this is a finding.
Fix: F-67400r981915_fix
Configure the container platform to update the list of passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004060
- Version
- SRG-APP-000840-CTR-000210
- Vuln IDs
-
- V-263593
- Rule IDs
-
- SV-263593r982461_rule
Checks: C-67493r982460_chk
Verify the container platform is configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly. If the container platform is not configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly, this is a finding.
Fix: F-67401r981918_fix
Configure the container platform to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- SRG-APP-000845-CTR-000220
- Vuln IDs
-
- V-263594
- Rule IDs
-
- SV-263594r982463_rule
Checks: C-67494r982462_chk
Verify the container platform is configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a). If the container platform is not configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a), this is a finding.
Fix: F-67402r981921_fix
Configure the container platform to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- RMF Control
- Severity
- M
- CCI
- CCI-004063
- Version
- SRG-APP-000855-CTR-000240
- Vuln IDs
-
- V-263595
- Rule IDs
-
- SV-263595r982465_rule
Checks: C-67495r982464_chk
Verify the container platform is configured to require immediate selection of a new password upon account recovery. If the container platform is not configured to require immediate selection of a new password upon account recovery, this is a finding.
Fix: F-67403r981924_fix
Configure the container platform to require immediate selection of a new password upon account recovery.
- RMF Control
- Severity
- M
- CCI
- CCI-004064
- Version
- SRG-APP-000860-CTR-000250
- Vuln IDs
-
- V-263596
- Rule IDs
-
- SV-263596r982467_rule
Checks: C-67496r982466_chk
Verify the container platform is configured to allow user selection of long passwords and passphrases, including spaces and all printable characters. If the container platform is not configured to allow user selection of long passwords and passphrases, including spaces and all printable characters, this is a finding.
Fix: F-67404r981927_fix
Configure the container platform to allow user selection of long passwords and passphrases, including spaces and all printable characters.
- RMF Control
- Severity
- M
- CCI
- CCI-004065
- Version
- SRG-APP-000865-CTR-000260
- Vuln IDs
-
- V-263597
- Rule IDs
-
- SV-263597r982469_rule
Checks: C-67497r982468_chk
Verify the container platform is configured to employ automated tools to assist the user in selecting strong password authenticators. If the container platform is not configured to employ automated tools to assist the user in selecting strong password authenticators, this is a finding.
Fix: F-67405r981930_fix
Configure the container platform to employ automated tools to assist the user in selecting strong password authenticators.
- RMF Control
- Severity
- M
- CCI
- CCI-004192
- Version
- SRG-APP-000880-CTR-000290
- Vuln IDs
-
- V-263598
- Rule IDs
-
- SV-263598r982471_rule
Checks: C-67498r982470_chk
Verify the container platform is configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths. If the container platform is not configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths, this is a finding.
Fix: F-67406r981933_fix
Configure the container platform to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
- RMF Control
- Severity
- M
- CCI
- CCI-004909
- Version
- SRG-APP-000910-CTR-000300
- Vuln IDs
-
- V-263599
- Rule IDs
-
- SV-263599r982473_rule
Checks: C-67499r982472_chk
Verify the container platform is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If the container platform is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix: F-67407r981936_fix
Configure the container platform to include only approved trust anchors in trust stores or certificate stores managed by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004910
- Version
- SRG-APP-000915-CTR-000310
- Vuln IDs
-
- V-263600
- Rule IDs
-
- SV-263600r982475_rule
Checks: C-67500r982474_chk
Verify the container platform is configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the container platform is not configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Fix: F-67408r981939_fix
Configure the container platform to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- RMF Control
- Severity
- M
- CCI
- CCI-004922
- Version
- SRG-APP-000920-CTR-000320
- Vuln IDs
-
- V-263601
- Rule IDs
-
- SV-263601r982477_rule
Checks: C-67501r982476_chk
Verify the container platform is configured to synchronize system clocks within and between systems or system components. If the container platform is not configured to synchronize system clocks within and between systems or system components, this is a finding.
Fix: F-67409r981942_fix
Configure the container platform to synchronize system clocks within and between systems or system components.