OpenShift must contain only container images for those capabilities being offered by the container platform.

STIG ID: CNTR-OS-000380  |  SRG: SRG-APP-000141-CTR-000320 | Severity: medium |  CCI: CCI-000381

Vulnerability Discussion

Allowing container images to reside within the container platform registry that are not essential to the capabilities being offered by the container platform becomes a potential security risk. By allowing these nonessential container images to exist, the possibility for accidental instantiation exists. The images may be unpatched, not supported, or offer nonapproved capabilities. Those images for customer services are considered essential capabilities.

Check

To review the container images within the container platform registry, execute the following:

oc get images

Review the container platform container images to validate that only container images necessary for the functionality of the information system are present. If unnecessary container images exist, this is a finding.

Fix

Remove any images from the container registry that are not required for the functionality of the system by executing the following:

oc delete image -n