Red Hat OpenShift Container Platform STIG V2R1

View as one page
STIG ID Title
CNTR-OS-000010 OpenShift must use TLS 1.2 or greater for secure container image transport from trusted sources.
CNTR-OS-000020 OpenShift must use TLS 1.2 or greater for secure communication.
CNTR-OS-000030 OpenShift must use a centralized user management solution to support account management functions.
CNTR-OS-000040 The kubeadmin account must be disabled.
CNTR-OS-000050 OpenShift must automatically audit account creation.
CNTR-OS-000060 OpenShift must automatically audit account modification.
CNTR-OS-000070 OpenShift must generate audit rules to capture account related actions.
CNTR-OS-000080 Open Shift must automatically audit account removal actions.
CNTR-OS-000090 OpenShift RBAC access controls must be enforced.
CNTR-OS-000100 OpenShift must enforce network policy on the namespace for controlling the flow of information within the container platform based on organization-defined information flow control policies.
CNTR-OS-000110 OpenShift must enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies.
CNTR-OS-000130 OpenShift must display the Standard Mandatory DOD Notice and Consent Banner before granting access to platform components.
CNTR-OS-000150 OpenShift must generate audit records for all DOD-defined auditable events within all components in the platform.
CNTR-OS-000160 OpenShift must generate audit records when successful/unsuccessful attempts to access privileges occur.
CNTR-OS-000170 Red Hat Enterprise Linux CoreOS (RHCOS) must initiate session audits at system startup.
CNTR-OS-000180 All audit records must identify what type of event has occurred within OpenShift.
CNTR-OS-000190 OpenShift audit records must have a date and time association with all events.
CNTR-OS-000200 All audit records must generate the event results within OpenShift.
CNTR-OS-000210 OpenShift must take appropriate action upon an audit failure.
CNTR-OS-000220 OpenShift components must provide the ability to send audit logs to a central enterprise repository for review and analysis.
CNTR-OS-000230 OpenShift must use internal system clocks to generate audit record time stamps.
CNTR-OS-000240 The Red Hat Enterprise Linux CoreOS (RHCOS) chrony Daemon must use multiple NTP servers to generate audit record time stamps.
CNTR-OS-000250 OpenShift must protect audit logs from any type of unauthorized access.
CNTR-OS-000260 OpenShift must protect system journal file from any type of unauthorized access by setting file permissions.
CNTR-OS-000270 OpenShift must protect system journal file from any type of unauthorized access by setting owner permissions.
CNTR-OS-000280 OpenShift must protect log directory from any type of unauthorized access by setting file permissions.
CNTR-OS-000290 OpenShift must protect log directory from any type of unauthorized access by setting owner permissions.
CNTR-OS-000300 OpenShift must protect pod log files from any type of unauthorized access by setting owner permissions.
CNTR-OS-000310 OpenShift must protect audit information from unauthorized modification.
CNTR-OS-000320 OpenShift must prevent unauthorized changes to logon UIDs.
CNTR-OS-000330 OpenShift must protect audit tools from unauthorized access.
CNTR-OS-000340 OpenShift must use FIPS-validated cryptographic mechanisms to protect the integrity of log information.
CNTR-OS-000360 OpenShift must verify container images.
CNTR-OS-000380 OpenShift must contain only container images for those capabilities being offered by the container platform.
CNTR-OS-000390 OpenShift runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.
CNTR-OS-000400 OpenShift must disable root and terminate network connections.
CNTR-OS-000430 OpenShift must use multifactor authentication for network access to accounts.
CNTR-OS-000440 OpenShift must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
CNTR-OS-000460 OpenShift must use FIPS validated LDAP or OpenIDConnect.
CNTR-OS-000490 OpenShift must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.
CNTR-OS-000500 OpenShift must separate user functionality (including user interface services) from information system management functionality.
CNTR-OS-000510 OpenShift must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 validated cryptography.
CNTR-OS-000540 OpenShift runtime must isolate security functions from nonsecurity functions.
CNTR-OS-000560 OpenShift must prevent unauthorized and unintended information transfer via shared system resources and enable page poisoning.
CNTR-OS-000570 OpenShift must disable virtual syscalls.
CNTR-OS-000580 OpenShift must enable poisoning of SLUB/SLAB objects.
CNTR-OS-000590 OpenShift must set the sticky bit for world-writable directories.
CNTR-OS-000600 OpenShift must restrict access to the kernel buffer.
CNTR-OS-000610 OpenShift must prevent kernel profiling.
CNTR-OS-000620 OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by setting a default Resource Quota.
CNTR-OS-000630 OpenShift must restrict individuals the ability to launch organizational-defined Denial-of-Service (DOS) attacks against other information systems by rate-limiting.
CNTR-OS-000650 OpenShift must display an explicit logout message indicating the reliable termination of authenticated communication sessions.
CNTR-OS-000660 Container images instantiated by OpenShift must execute using least privileges.
CNTR-OS-000670 Red Hat Enterprise Linux CoreOS (RHCOS) must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility.
CNTR-OS-000690 OpenShift must configure Alert Manger Receivers to notify SA and ISSO of all audit failure events requiring real-time alerts.
CNTR-OS-000720 OpenShift must enforce access restrictions and support auditing of the enforcement actions.
CNTR-OS-000740 OpenShift must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
CNTR-OS-000760 OpenShift must set server token max age no greater than eight hours.
CNTR-OS-000770 Vulnerability scanning applications must implement privileged access authorization to all OpenShift components, containers, and container images for selected organization-defined vulnerability scanning activities.
CNTR-OS-000780 OpenShift keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.
CNTR-OS-000800 OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by employing organization-defined security safeguards by including a default resource quota.
CNTR-OS-000810 OpenShift must protect against or limit the effects of all types of Denial-of-Service (DoS) attacks by defining resource quotas on a namespace.
CNTR-OS-000820 OpenShift must protect the confidentiality and integrity of transmitted information.
CNTR-OS-000860 Red Hat Enterprise Linux CoreOS (RHCOS) must implement nonexecutable data to protect its memory from unauthorized code execution.
CNTR-OS-000870 Red Hat Enterprise Linux CoreOS (RHCOS) must implement ASLR (Address Space Layout Randomization) from unauthorized code execution.
CNTR-OS-000880 OpenShift must remove old components after updated versions have been installed.
CNTR-OS-000890 OpenShift must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs.
CNTR-OS-000900 OpenShift runtime must have updates installed within the period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
CNTR-OS-000910 The Compliance Operator must be configured.
CNTR-OS-000920 OpenShift must perform verification of the correct operation of security functions: upon startup and/or restart; upon command by a user with privileged access; and/or every 30 days.
CNTR-OS-000930 OpenShift must generate audit records when successful/unsuccessful attempts to modify privileges occur.
CNTR-OS-000940 OpenShift must generate audit records when successful/unsuccessful attempts to modify security objects occur.
CNTR-OS-000950 OpenShift must generate audit records when successful/unsuccessful attempts to delete privileges occur.
CNTR-OS-000960 OpenShift must generate audit records when successful/unsuccessful attempts to delete security objects occur.
CNTR-OS-000970 OpenShift must generate audit records when successful/unsuccessful logon attempts occur.
CNTR-OS-000980 Red Hat Enterprise Linux CoreOS (RHCOS) must be configured to audit the loading and unloading of dynamic kernel modules.
CNTR-OS-000990 OpenShift audit records must record user access start and end times.
CNTR-OS-001000 OpenShift must generate audit records when concurrent logons from different workstations and systems occur.
CNTR-OS-001010 Red Hat Enterprise Linux CoreOS (RHCOS) must disable SSHD service.
CNTR-OS-001020 Red Hat Enterprise Linux CoreOS (RHCOS) must disable USB Storage kernel module.
CNTR-OS-001030 Red Hat Enterprise Linux CoreOS (RHCOS) must use USBGuard for hosts that include a USB Controller.
CNTR-OS-001060 OpenShift must continuously scan components, containers, and images for vulnerabilities.
CNTR-OS-001080 OpenShift must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (nonlegacy use).