Authentication files for the container platform must be protected.

STIG ID: SRG-APP-000133-CTR-000310  |  SRG: SRG-APP-000133 |  Severity: medium |  CCI: CCI-001499 |  Vulnerability Id: V-233070

Vulnerability Discussion

The secure configuration of the container platform must be protected by disallowing changing to be implemented by non-privileged users. Changes to the container platform can introduce security risks and stability issues and undermine change management procedures. To secure authentication files from non-privileged user modification can be enforced using file ownership and permissions.

Examples of authentication files are keys, certificates, and tokens.

Check

Review the container platform to verify that authentication files cannot be modified by non-privileged users.

If non-privileged users can modify key and certificate files, this is a finding.

Fix

Configure the container platform to only allow authentication file modifications by privileged users.