The container platform must enforce approved authorizations for controlling the flow of information between interconnected systems and services based on organization-defined information flow control policies.

STIG ID: SRG-APP-000039-CTR-000110  |  SRG: SRG-APP-000039 |  Severity: medium |  CCI: CCI-001414 |  Vulnerability Id: V-233030

Vulnerability Discussion

Controlling information flow between the container platform components and container user services instantiated by the container platform must enforce organization-defined information flow policies. Example methods for information flow control are: using labels for containers to segregate services; user permissions and roles to limit what user services are available to each user; controlling the user the services are able to execute as; and limiting inter-container network traffic and the resources containers can consume.

Check

Review the container platform configuration to determine if organization-defined information flow controls are implemented.

If information flow controls are not implemented, this is a finding.

Fix

Configure the container platform to implement organization-defined information flow controls.