Red Hat OpenShift Container Platform STIG V2R1

This is not the latest version of the STIG. This is provided for archival purposes. See the latest STIG.

View as one page
STIG IDTitle
CNTR-OS-000010OpenShift must use TLS 1.2 or greater for secure container image transport from trusted sources.
CNTR-OS-000020OpenShift must use TLS 1.2 or greater for secure communication.
CNTR-OS-000030OpenShift must use a centralized user management solution to support account management functions.
CNTR-OS-000040The kubeadmin account must be disabled.
CNTR-OS-000050OpenShift must automatically audit account creation.
CNTR-OS-000060OpenShift must automatically audit account modification.
CNTR-OS-000070OpenShift must generate audit rules to capture account related actions.
CNTR-OS-000080Open Shift must automatically audit account removal actions.
CNTR-OS-000090OpenShift RBAC access controls must be enforced.
CNTR-OS-000100OpenShift must enforce network policy on the namespace for controlling the flow of information within the container platform based on organization-defined information flow control policies.
CNTR-OS-000110OpenShift must enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies.
CNTR-OS-000130OpenShift must display the Standard Mandatory DOD Notice and Consent Banner before granting access to platform components.
CNTR-OS-000150OpenShift must generate audit records for all DOD-defined auditable events within all components in the platform.
CNTR-OS-000160OpenShift must generate audit records when successful/unsuccessful attempts to access privileges occur.
CNTR-OS-000170Red Hat Enterprise Linux CoreOS (RHCOS) must initiate session audits at system startup.
CNTR-OS-000180All audit records must identify what type of event has occurred within OpenShift.
CNTR-OS-000190OpenShift audit records must have a date and time association with all events.
CNTR-OS-000200All audit records must generate the event results within OpenShift.
CNTR-OS-000210OpenShift must take appropriate action upon an audit failure.
CNTR-OS-000220OpenShift components must provide the ability to send audit logs to a central enterprise repository for review and analysis.
CNTR-OS-000230OpenShift must use internal system clocks to generate audit record time stamps.
CNTR-OS-000240The Red Hat Enterprise Linux CoreOS (RHCOS) chrony Daemon must use multiple NTP servers to generate audit record time stamps.
CNTR-OS-000250OpenShift must protect audit logs from any type of unauthorized access.
CNTR-OS-000260OpenShift must protect system journal file from any type of unauthorized access by setting file permissions.
CNTR-OS-000270OpenShift must protect system journal file from any type of unauthorized access by setting owner permissions.
CNTR-OS-000280OpenShift must protect log directory from any type of unauthorized access by setting file permissions.
CNTR-OS-000290OpenShift must protect log directory from any type of unauthorized access by setting owner permissions.
CNTR-OS-000300OpenShift must protect pod log files from any type of unauthorized access by setting owner permissions.
CNTR-OS-000310OpenShift must protect audit information from unauthorized modification.
CNTR-OS-000320OpenShift must prevent unauthorized changes to logon UIDs.
CNTR-OS-000330OpenShift must protect audit tools from unauthorized access.
CNTR-OS-000340OpenShift must use FIPS-validated cryptographic mechanisms to protect the integrity of log information.
CNTR-OS-000360OpenShift must verify container images.
CNTR-OS-000380OpenShift must contain only container images for those capabilities being offered by the container platform.
CNTR-OS-000390OpenShift runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.
CNTR-OS-000400OpenShift must disable root and terminate network connections.
CNTR-OS-000430OpenShift must use multifactor authentication for network access to accounts.
CNTR-OS-000440OpenShift must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
CNTR-OS-000460OpenShift must use FIPS validated LDAP or OpenIDConnect.
CNTR-OS-000490OpenShift must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.
CNTR-OS-000500OpenShift must separate user functionality (including user interface services) from information system management functionality.
CNTR-OS-000510OpenShift must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 validated cryptography.
CNTR-OS-000540OpenShift runtime must isolate security functions from nonsecurity functions.
CNTR-OS-000560OpenShift must prevent unauthorized and unintended information transfer via shared system resources and enable page poisoning.
CNTR-OS-000570OpenShift must disable virtual syscalls.
CNTR-OS-000580OpenShift must enable poisoning of SLUB/SLAB objects.
CNTR-OS-000590OpenShift must set the sticky bit for world-writable directories.
CNTR-OS-000600OpenShift must restrict access to the kernel buffer.
CNTR-OS-000610OpenShift must prevent kernel profiling.
CNTR-OS-000620OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by setting a default Resource Quota.
CNTR-OS-000630OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by rate-limiting.
CNTR-OS-000650OpenShift must display an explicit logout message indicating the reliable termination of authenticated communication sessions.
CNTR-OS-000660Container images instantiated by OpenShift must execute using least privileges.
CNTR-OS-000670Red Hat Enterprise Linux CoreOS (RHCOS) must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility.
CNTR-OS-000690OpenShift must configure Alert Manger Receivers to notify SA and ISSO of all audit failure events requiring real-time alerts.
CNTR-OS-000720OpenShift must enforce access restrictions and support auditing of the enforcement actions.
CNTR-OS-000740OpenShift must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
CNTR-OS-000760OpenShift must set server token max age no greater than eight hours.
CNTR-OS-000770Vulnerability scanning applications must implement privileged access authorization to all OpenShift components, containers, and container images for selected organization-defined vulnerability scanning activities.
CNTR-OS-000780OpenShift keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.
CNTR-OS-000800OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by employing organization-defined security safeguards by including a default resource quota.
CNTR-OS-000810OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by defining resource quotas on a namespace.
CNTR-OS-000820OpenShift must protect the confidentiality and integrity of transmitted information.
CNTR-OS-000860Red Hat Enterprise Linux CoreOS (RHCOS) must implement nonexecutable data to protect its memory from unauthorized code execution.
CNTR-OS-000870Red Hat Enterprise Linux CoreOS (RHCOS) must implement ASLR (Address Space Layout Randomization) from unauthorized code execution.
CNTR-OS-000880OpenShift must remove old components after updated versions have been installed.
CNTR-OS-000890OpenShift must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs.
CNTR-OS-000900OpenShift runtime must have updates installed within the period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
CNTR-OS-000910The Compliance Operator must be configured.
CNTR-OS-000920OpenShift must perform verification of the correct operation of security functions: upon startup and/or restart; upon command by a user with privileged access; and/or every 30 days.
CNTR-OS-000930OpenShift must generate audit records when successful/unsuccessful attempts to modify privileges occur.
CNTR-OS-000940OpenShift must generate audit records when successful/unsuccessful attempts to modify security objects occur.
CNTR-OS-000950OpenShift must generate audit records when successful/unsuccessful attempts to delete privileges occur.
CNTR-OS-000960OpenShift must generate audit records when successful/unsuccessful attempts to delete security objects occur.
CNTR-OS-000970OpenShift must generate audit records when successful/unsuccessful logon attempts occur.
CNTR-OS-000980Red Hat Enterprise Linux CoreOS (RHCOS) must be configured to audit the loading and unloading of dynamic kernel modules.
CNTR-OS-000990OpenShift audit records must record user access start and end times.
CNTR-OS-001000OpenShift must generate audit records when concurrent logons from different workstations and systems occur.
CNTR-OS-001010Red Hat Enterprise Linux CoreOS (RHCOS) must disable SSHD service.
CNTR-OS-001020Red Hat Enterprise Linux CoreOS (RHCOS) must disable USB Storage kernel module.
CNTR-OS-001030Red Hat Enterprise Linux CoreOS (RHCOS) must use USBGuard for hosts that include a USB Controller.
CNTR-OS-001060OpenShift must continuously scan components, containers, and images for vulnerabilities.
CNTR-OS-001080OpenShift must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (nonlegacy use).