Red Hat OpenShift Container Platform v1r1

Released 2023-09-08


View as One Page
STIG IDTitle
CNTR-OS-000010OpenShift must use TLS 1.2 or greater for secure container image transport from trusted sources.
CNTR-OS-000020OpenShift must use TLS 1.2 or greater for secure communication.
CNTR-OS-000030OpenShift must use a centralized user management solution to support account management functions.
CNTR-OS-000040The kubeadmin account must be disabled.
CNTR-OS-000050OpenShift must automatically audit account creation.
CNTR-OS-000060OpenShift must automatically audit account modification.
CNTR-OS-000070OpenShift must generate audit rules to capture account related actions.
CNTR-OS-000080Open Shift must automatically audit account removal actions.
CNTR-OS-000090OpenShift RBAC access controls must be enforced.
CNTR-OS-000100OpenShift must enforce network policy on the namespace for controlling the flow of information within the container platform based on organization-defined information flow control policies.
CNTR-OS-000110OpenShift must enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies.
CNTR-OS-000130OpenShift must display the Standard Mandatory DOD Notice and Consent Banner before granting access to platform components.
CNTR-OS-000150OpenShift must generate audit records for all DOD-defined auditable events within all components in the platform.
CNTR-OS-000160OpenShift must generate audit records when successful/unsuccessful attempts to access privileges occur.
CNTR-OS-000170Red Hat Enterprise Linux CoreOS (RHCOS) must initiate session audits at system startup.
CNTR-OS-000180All audit records must identify what type of event has occurred within OpenShift.
CNTR-OS-000190OpenShift audit records must have a date and time association with all events.
CNTR-OS-000200All audit records must generate the event results within OpenShift.
CNTR-OS-000210OpenShift must take appropriate action upon an audit failure.
CNTR-OS-000220OpenShift components must provide the ability to send audit logs to a central enterprise repository for review and analysis.
CNTR-OS-000230OpenShift must use internal system clocks to generate audit record time stamps.
CNTR-OS-000240The Red Hat Enterprise Linux CoreOS (RHCOS) chrony Daemon must use multiple NTP servers to generate audit record time stamps.
CNTR-OS-000250OpenShift must protect audit logs from any type of unauthorized access.
CNTR-OS-000260OpenShift must protect system journal file from any type of unauthorized access by setting file permissions.
CNTR-OS-000270OpenShift must protect system journal file from any type of unauthorized access by setting owner permissions.
CNTR-OS-000280OpenShift must protect log directory from any type of unauthorized access by setting file permissions.
CNTR-OS-000290OpenShift must protect log directory from any type of unauthorized access by setting owner permissions.
CNTR-OS-000300OpenShift must protect pod log files from any type of unauthorized access by setting owner permissions.
CNTR-OS-000310OpenShift must protect audit information from unauthorized modification.
CNTR-OS-000320OpenShift must prevent unauthorized changes to logon UIDs.
CNTR-OS-000330OpenShift must protect audit tools from unauthorized access.
CNTR-OS-000340OpenShift must use FIPS-validated cryptographic mechanisms to protect the integrity of log information.
CNTR-OS-000360OpenShift must verify container images.
CNTR-OS-000380OpenShift must contain only container images for those capabilities being offered by the container platform.
CNTR-OS-000390OpenShift runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.
CNTR-OS-000400OpenShift must disable root and terminate network connections.
CNTR-OS-000430OpenShift must use multifactor authentication for network access to accounts.
CNTR-OS-000440OpenShift must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
CNTR-OS-000460OpenShift must use FIPS validated LDAP or OpenIDConnect.
CNTR-OS-000490OpenShift must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.
CNTR-OS-000500OpenShift must separate user functionality (including user interface services) from information system management functionality.
CNTR-OS-000510OpenShift must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 validated cryptography.
CNTR-OS-000540OpenShift runtime must isolate security functions from nonsecurity functions.
CNTR-OS-000560OpenShift must prevent unauthorized and unintended information transfer via shared system resources and enable page poisoning.
CNTR-OS-000570OpenShift must disable virtual syscalls.
CNTR-OS-000580OpenShift must enable poisoning of SLUB/SLAB objects.
CNTR-OS-000590OpenShift must set the sticky bit for world-writable directories.
CNTR-OS-000600OpenShift must restrict access to the kernel buffer.
CNTR-OS-000610OpenShift must prevent kernel profiling.
CNTR-OS-000620OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by setting a default Resource Quota.
CNTR-OS-000630OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by rate-limiting.
CNTR-OS-000650OpenShift must display an explicit logout message indicating the reliable termination of authenticated communication sessions.
CNTR-OS-000660Container images instantiated by OpenShift must execute using least privileges.
CNTR-OS-000670Red Hat Enterprise Linux CoreOS (RHCOS) must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility.
CNTR-OS-000690OpenShift must configure Alert Manger Receivers to notify SA and ISSO of all audit failure events requiring real-time alerts.
CNTR-OS-000720OpenShift must enforce access restrictions and support auditing of the enforcement actions.
CNTR-OS-000740OpenShift must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
CNTR-OS-000760OpenShift must set server token max age no greater than eight hours.
CNTR-OS-000770Vulnerability scanning applications must implement privileged access authorization to all OpenShift components, containers, and container images for selected organization-defined vulnerability scanning activities.
CNTR-OS-000780OpenShift keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.
CNTR-OS-000800OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by employing organization-defined security safeguards by including a default resource quota.
CNTR-OS-000810OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by defining resource quotas on a namespace.
CNTR-OS-000820OpenShift must protect the confidentiality and integrity of transmitted information.
CNTR-OS-000860Red Hat Enterprise Linux CoreOS (RHCOS) must implement nonexecutable data to protect its memory from unauthorized code execution.
CNTR-OS-000870Red Hat Enterprise Linux CoreOS (RHCOS) must implement ASLR (Address Space Layout Randomization) from unauthorized code execution.
CNTR-OS-000880OpenShift must remove old components after updated versions have been installed.
CNTR-OS-000890OpenShift must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs.
CNTR-OS-000900OpenShift runtime must have updates installed within the period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
CNTR-OS-000910The Compliance Operator must be configured.
CNTR-OS-000920OpenShift must perform verification of the correct operation of security functions: upon startup and/or restart; upon command by a user with privileged access; and/or every 30 days.
CNTR-OS-000930OpenShift must generate audit records when successful/unsuccessful attempts to modify privileges occur.
CNTR-OS-000940OpenShift must generate audit records when successful/unsuccessful attempts to modify security objects occur.
CNTR-OS-000950OpenShift must generate audit records when successful/unsuccessful attempts to delete privileges occur.
CNTR-OS-000960OpenShift must generate audit records when successful/unsuccessful attempts to delete security objects occur.
CNTR-OS-000970OpenShift must generate audit records when successful/unsuccessful logon attempts occur.
CNTR-OS-000980Red Hat Enterprise Linux CoreOS (RHCOS) must be configured to audit the loading and unloading of dynamic kernel modules.
CNTR-OS-000990OpenShift audit records must record user access start and end times.
CNTR-OS-001000OpenShift must generate audit records when concurrent logons from different workstations and systems occur.
CNTR-OS-001010Red Hat Enterprise Linux CoreOS (RHCOS) must disable SSHD service.
CNTR-OS-001020Red Hat Enterprise Linux CoreOS (RHCOS) must disable USB Storage kernel module.
CNTR-OS-001030Red Hat Enterprise Linux CoreOS (RHCOS) must use USBGuard for hosts that include a USB Controller.
CNTR-OS-001060OpenShift must continuously scan components, containers, and images for vulnerabilities.
CNTR-OS-001080OpenShift must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (nonlegacy use).