Released 2024-10-23
STIG ID | Title |
---|---|
CNTR-OS-000010 | OpenShift must use TLS 1.2 or greater for secure container image transport from trusted sources. |
CNTR-OS-000020 | OpenShift must use TLS 1.2 or greater for secure communication. |
CNTR-OS-000030 | OpenShift must use a centralized user management solution to support account management functions. |
CNTR-OS-000040 | The kubeadmin account must be disabled. |
CNTR-OS-000050 | OpenShift must automatically audit account creation. |
CNTR-OS-000060 | OpenShift must automatically audit account modification. |
CNTR-OS-000070 | OpenShift must generate audit rules to capture account related actions. |
CNTR-OS-000080 | Open Shift must automatically audit account removal actions. |
CNTR-OS-000090 | OpenShift RBAC access controls must be enforced. |
CNTR-OS-000100 | OpenShift must enforce network policy on the namespace for controlling the flow of information within the container platform based on organization-defined information flow control policies. |
CNTR-OS-000110 | OpenShift must enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies. |
CNTR-OS-000130 | OpenShift must display the Standard Mandatory DOD Notice and Consent Banner before granting access to platform components. |
CNTR-OS-000150 | OpenShift must generate audit records for all DOD-defined auditable events within all components in the platform. |
CNTR-OS-000160 | OpenShift must generate audit records when successful/unsuccessful attempts to access privileges occur. |
CNTR-OS-000170 | Red Hat Enterprise Linux CoreOS (RHCOS) must initiate session audits at system startup. |
CNTR-OS-000180 | All audit records must identify what type of event has occurred within OpenShift. |
CNTR-OS-000190 | OpenShift audit records must have a date and time association with all events. |
CNTR-OS-000200 | All audit records must generate the event results within OpenShift. |
CNTR-OS-000210 | OpenShift must take appropriate action upon an audit failure. |
CNTR-OS-000220 | OpenShift components must provide the ability to send audit logs to a central enterprise repository for review and analysis. |
CNTR-OS-000230 | OpenShift must use internal system clocks to generate audit record time stamps. |
CNTR-OS-000240 | The Red Hat Enterprise Linux CoreOS (RHCOS) chrony Daemon must use multiple NTP servers to generate audit record time stamps. |
CNTR-OS-000250 | OpenShift must protect audit logs from any type of unauthorized access. |
CNTR-OS-000260 | OpenShift must protect system journal file from any type of unauthorized access by setting file permissions. |
CNTR-OS-000270 | OpenShift must protect system journal file from any type of unauthorized access by setting owner permissions. |
CNTR-OS-000280 | OpenShift must protect log directory from any type of unauthorized access by setting file permissions. |
CNTR-OS-000290 | OpenShift must protect log directory from any type of unauthorized access by setting owner permissions. |
CNTR-OS-000300 | OpenShift must protect pod log files from any type of unauthorized access by setting owner permissions. |
CNTR-OS-000310 | OpenShift must protect audit information from unauthorized modification. |
CNTR-OS-000320 | OpenShift must prevent unauthorized changes to logon UIDs. |
CNTR-OS-000330 | OpenShift must protect audit tools from unauthorized access. |
CNTR-OS-000340 | OpenShift must use FIPS-validated cryptographic mechanisms to protect the integrity of log information. |
CNTR-OS-000360 | OpenShift must verify container images. |
CNTR-OS-000380 | OpenShift must contain only container images for those capabilities being offered by the container platform. |
CNTR-OS-000390 | OpenShift runtime must enforce ports, protocols, and services that adhere to the PPSM CAL. |
CNTR-OS-000400 | OpenShift must disable root and terminate network connections. |
CNTR-OS-000430 | OpenShift must use multifactor authentication for network access to accounts. |
CNTR-OS-000440 | OpenShift must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts. |
CNTR-OS-000460 | OpenShift must use FIPS validated LDAP or OpenIDConnect. |
CNTR-OS-000490 | OpenShift must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity. |
CNTR-OS-000500 | OpenShift must separate user functionality (including user interface services) from information system management functionality. |
CNTR-OS-000510 | OpenShift must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 validated cryptography. |
CNTR-OS-000540 | OpenShift runtime must isolate security functions from nonsecurity functions. |
CNTR-OS-000560 | OpenShift must prevent unauthorized and unintended information transfer via shared system resources and enable page poisoning. |
CNTR-OS-000570 | OpenShift must disable virtual syscalls. |
CNTR-OS-000580 | OpenShift must enable poisoning of SLUB/SLAB objects. |
CNTR-OS-000590 | OpenShift must set the sticky bit for world-writable directories. |
CNTR-OS-000600 | OpenShift must restrict access to the kernel buffer. |
CNTR-OS-000610 | OpenShift must prevent kernel profiling. |
CNTR-OS-000620 | OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by setting a default Resource Quota. |
CNTR-OS-000630 | OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by rate-limiting. |
CNTR-OS-000650 | OpenShift must display an explicit logout message indicating the reliable termination of authenticated communication sessions. |
CNTR-OS-000660 | Container images instantiated by OpenShift must execute using least privileges. |
CNTR-OS-000670 | Red Hat Enterprise Linux CoreOS (RHCOS) must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility. |
CNTR-OS-000690 | OpenShift must configure Alert Manger Receivers to notify SA and ISSO of all audit failure events requiring real-time alerts. |
CNTR-OS-000720 | OpenShift must enforce access restrictions and support auditing of the enforcement actions. |
CNTR-OS-000740 | OpenShift must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization. |
CNTR-OS-000760 | OpenShift must set server token max age no greater than eight hours. |
CNTR-OS-000770 | Vulnerability scanning applications must implement privileged access authorization to all OpenShift components, containers, and container images for selected organization-defined vulnerability scanning activities. |
CNTR-OS-000780 | OpenShift keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform. |
CNTR-OS-000800 | OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by employing organization-defined security safeguards by including a default resource quota. |
CNTR-OS-000810 | OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by defining resource quotas on a namespace. |
CNTR-OS-000820 | OpenShift must protect the confidentiality and integrity of transmitted information. |
CNTR-OS-000860 | Red Hat Enterprise Linux CoreOS (RHCOS) must implement nonexecutable data to protect its memory from unauthorized code execution. |
CNTR-OS-000870 | Red Hat Enterprise Linux CoreOS (RHCOS) must implement ASLR (Address Space Layout Randomization) from unauthorized code execution. |
CNTR-OS-000880 | OpenShift must remove old components after updated versions have been installed. |
CNTR-OS-000890 | OpenShift must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs. |
CNTR-OS-000900 | OpenShift runtime must have updates installed within the period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs). |
CNTR-OS-000910 | The Compliance Operator must be configured. |
CNTR-OS-000920 | OpenShift must perform verification of the correct operation of security functions: upon startup and/or restart; upon command by a user with privileged access; and/or every 30 days. |
CNTR-OS-000930 | OpenShift must generate audit records when successful/unsuccessful attempts to modify privileges occur. |
CNTR-OS-000940 | OpenShift must generate audit records when successful/unsuccessful attempts to modify security objects occur. |
CNTR-OS-000950 | OpenShift must generate audit records when successful/unsuccessful attempts to delete privileges occur. |
CNTR-OS-000960 | OpenShift must generate audit records when successful/unsuccessful attempts to delete security objects occur. |
CNTR-OS-000970 | OpenShift must generate audit records when successful/unsuccessful logon attempts occur. |
CNTR-OS-000980 | Red Hat Enterprise Linux CoreOS (RHCOS) must be configured to audit the loading and unloading of dynamic kernel modules. |
CNTR-OS-000990 | OpenShift audit records must record user access start and end times. |
CNTR-OS-001000 | OpenShift must generate audit records when concurrent logons from different workstations and systems occur. |
CNTR-OS-001010 | Red Hat Enterprise Linux CoreOS (RHCOS) must disable SSHD service. |
CNTR-OS-001020 | Red Hat Enterprise Linux CoreOS (RHCOS) must disable USB Storage kernel module. |
CNTR-OS-001030 | Red Hat Enterprise Linux CoreOS (RHCOS) must use USBGuard for hosts that include a USB Controller. |
CNTR-OS-001060 | OpenShift must continuously scan components, containers, and images for vulnerabilities. |
CNTR-OS-001080 | OpenShift must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (nonlegacy use). |