SV-233128r599705_rule
V-233128
SRG-APP-000243
SRG-APP-000243-CTR-000600
CAT II
10
Deploy a container platform capable of effectively protecting the resources of one process or user from unauthorized access by another user or process. Configure the container platform to effectively protect the resources of one process or user from unauthorized access by another user or process. The container security solution should help the user understand where the code in the environment was deployed from, and provide controls that prevent deployment from untrusted sources or registries.
Review the container platform architecture documentation to find out if and how it protects the resources of one process or user (such as working memory, storage, host system kernel, network connections) from unauthorized access by another user or process.
If the container platform configuration settings do not effectively implement these protections to prevent unauthorized access by another user or process, this is a finding.
V-233128
False
SRG-APP-000243-CTR-000600
Review the container platform architecture documentation to find out if and how it protects the resources of one process or user (such as working memory, storage, host system kernel, network connections) from unauthorized access by another user or process.
If the container platform configuration settings do not effectively implement these protections to prevent unauthorized access by another user or process, this is a finding.
M
5239