This is not the latest version of the STIG. This is provided for archival purposes. See the latest STIG.

The container platform must enforce approved authorizations for controlling the flow of information between interconnected systems and services based on organization-defined information flow control policies.

STIG ID: SRG-APP-000039-CTR-000110  |  SRG: SRG-APP-000039 |  Severity: medium (CAT II)  |  CCI: CCI-001414 |  Vulnerability Id: V-233030

Vulnerability Discussion

Controlling information flow between the container platform components and container user services instantiated by the container platform must enforce organization-defined information flow policies. Example methods for information flow control are: using labels for containers to segregate services; user permissions and roles to limit what user services are available to each user; controlling the user the services are able to execute as; and limiting inter-container network traffic and the resources containers can consume.

Check

Review the container platform configuration to determine if organization-defined information flow controls are implemented.

If information flow controls are not implemented, this is a finding.

Fix

Configure the container platform to implement organization-defined information flow controls.