STIGQter STIGQter: STIG Summary: Container Platform Security Requirements Guide Version: 1 Release: 1 Benchmark Date: 20 Nov 2020:

The container platform must prevent unauthorized and unintended information transfer via shared system resources.

DISA Rule

SV-233128r599705_rule

Vulnerability Number

V-233128

Group Title

SRG-APP-000243

Rule Version

SRG-APP-000243-CTR-000600

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Deploy a container platform capable of effectively protecting the resources of one process or user from unauthorized access by another user or process. Configure the container platform to effectively protect the resources of one process or user from unauthorized access by another user or process. The container security solution should help the user understand where the code in the environment was deployed from, and provide controls that prevent deployment from untrusted sources or registries.

Check Contents

Review the container platform architecture documentation to find out if and how it protects the resources of one process or user (such as working memory, storage, host system kernel, network connections) from unauthorized access by another user or process.

If the container platform configuration settings do not effectively implement these protections to prevent unauthorized access by another user or process, this is a finding.

Vulnerability Number

V-233128

Documentable

False

Rule Version

SRG-APP-000243-CTR-000600

Severity Override Guidance

Review the container platform architecture documentation to find out if and how it protects the resources of one process or user (such as working memory, storage, host system kernel, network connections) from unauthorized access by another user or process.

If the container platform configuration settings do not effectively implement these protections to prevent unauthorized access by another user or process, this is a finding.

Check Content Reference

M

Target Key

5239

Comments