Checked | Name | Title |
---|
☐ | SV-233015r599509_rule | The container platform must use TLS 1.2 or greater for secure container image transport from trusted sources. |
☐ | SV-233016r599509_rule | The container platform must use TLS 1.2 or greater for secure communication. |
☐ | SV-233019r599509_rule | The container platform must use a centralized user management solution to support account management functions. |
☐ | SV-233020r599509_rule | The container platform must automatically remove or disable temporary user accounts after 72 hours. |
☐ | SV-233021r599509_rule | The container platform must automatically disable accounts after a 35-day period of account inactivity. |
☐ | SV-233022r599509_rule | The container platform must automatically audit account creation. |
☐ | SV-233023r599509_rule | The container platform must automatically audit account modification. |
☐ | SV-233024r599509_rule | The container platform must automatically audit account-disabling actions. |
☐ | SV-233025r599509_rule | The container platform must automatically audit account removal actions. |
☐ | SV-233026r599511_rule | Least privilege access and need to know must be required to access the container platform registry. |
☐ | SV-233027r599509_rule | Least privilege access and need to know must be required to access the container platform runtime. |
☐ | SV-233028r599509_rule | Least privilege access and need to know must be required to access the container platform keystore. |
☐ | SV-233029r599513_rule | The container platform must enforce approved authorizations for controlling the flow of information within the container platform based on organization-defined information flow control policies. |
☐ | SV-233030r599509_rule | The container platform must enforce approved authorizations for controlling the flow of information between interconnected systems and services based on organization-defined information flow control policies. |
☐ | SV-233031r599515_rule | The container platform must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. |
☐ | SV-233032r599517_rule | The container platform must display the Standard Mandatory DoD Notice and Consent Banner before granting access to platform components. |
☐ | SV-233033r599519_rule | The container platform must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage and conditions and take explicit actions to log on for further access. |
☐ | SV-233038r599521_rule | The container platform must generate audit records for all DoD-defined auditable events within all components in the platform. |
☐ | SV-233039r599523_rule | The container platform must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. |
☐ | SV-233040r599525_rule | The container platform must generate audit records when successful/unsuccessful attempts to access privileges occur. |
☐ | SV-233041r599714_rule | The container platform must initiate session auditing upon startup. |
☐ | SV-233042r599529_rule | All audit records must identify what type of event has occurred within the container platform. |
☐ | SV-233043r599531_rule | The container platform audit records must have a date and time association with all events. |
☐ | SV-233044r599533_rule | All audit records must identify where in the container platform the event occurred. |
☐ | SV-233045r599535_rule | All audit records must identify the source of the event within the container platform. |
☐ | SV-233046r599537_rule | All audit records must generate the event results within the container platform. |
☐ | SV-233047r599539_rule | All audit records must identify any users associated with the event within the container platform. |
☐ | SV-233048r599541_rule | All audit records must identify any containers associated with the event within the container platform. |
☐ | SV-233049r599543_rule | The container platform must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users. |
☐ | SV-233051r599704_rule | The container platform must take appropriate action upon an audit failure. |
☐ | SV-233052r599547_rule | The container platform components must provide the ability to send audit logs to a central enterprise repository for review and analysis. |
☐ | SV-233055r599509_rule | The container platform must use internal system clocks to generate audit record time stamps. |
☐ | SV-233056r599509_rule | The container platform must protect audit information from any type of unauthorized read access. |
☐ | SV-233057r599509_rule | The container platform must protect audit information from unauthorized modification. |
☐ | SV-233058r599509_rule | The container platform must protect audit information from unauthorized deletion. |
☐ | SV-233059r599509_rule | The container platform must protect audit tools from unauthorized access. |
☐ | SV-233060r599509_rule | The container platform must protect audit tools from unauthorized modification. |
☐ | SV-233061r599509_rule | The container platform must protect audit tools from unauthorized deletion. |
☐ | SV-233063r599549_rule | The container platform must use FIPS validated cryptographic mechanisms to protect the integrity of log information. |
☐ | SV-233064r599551_rule | The container platform must be built from verified packages. |
☐ | SV-233065r599553_rule | The container platform must verify container images. |
☐ | SV-233066r599715_rule | The container platform must limit privileges to the container platform registry. |
☐ | SV-233067r599557_rule | The container platform must limit privileges to the container platform runtime. |
☐ | SV-233068r599716_rule | The container platform must limit privileges to the container platform keystore. |
☐ | SV-233069r599509_rule | Configuration files for the container platform must be protected. |
☐ | SV-233070r599509_rule | Authentication files for the container platform must be protected. |
☐ | SV-233071r599509_rule | The container platform must be configured with only essential configurations. |
☐ | SV-233072r599509_rule | The container platform registry must contain only container images for those capabilities being offered by the container platform. |
☐ | SV-233073r599561_rule | The container platform runtime must enforce ports, protocols, and services that adhere to the PPSM CAL. |
☐ | SV-233074r599563_rule | The container platform runtime must enforce the use of ports that are non-privileged. |
☐ | SV-233075r599509_rule | The container platform must uniquely identify and authenticate users. |
☐ | SV-233076r599509_rule | The container platform application program interface (API) must uniquely identify and authenticate users. |
☐ | SV-233077r599509_rule | The container platform must uniquely identify and authenticate processes acting on behalf of the users. |
☐ | SV-233078r599565_rule | The container platform application program interface (API) must uniquely identify and authenticate processes acting on behalf of the users. |
☐ | SV-233079r599567_rule | The container platform must use multifactor authentication for network access to privileged accounts. |
☐ | SV-233080r599569_rule | The container platform must use multifactor authentication for network access to non-privileged accounts. |
☐ | SV-233081r599509_rule | The container platform must use multifactor authentication for local access to privileged accounts. |
☐ | SV-233082r599509_rule | The container platform must use multifactor authentication for local access to non-privileged accounts. |
☐ | SV-233083r599571_rule | The container platform must ensure users are authenticated with an individual authenticator prior to using a group authenticator. |
☐ | SV-233084r599573_rule | The container platform must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts. |
☐ | SV-233085r599575_rule | The container platform must implement replay-resistant authentication mechanisms for network access to non-privileged accounts. |
☐ | SV-233086r599577_rule | The container platform must uniquely identify all network-connected nodes before establishing any connection. |
☐ | SV-233087r599579_rule | The container platform must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. |
☐ | SV-233088r599509_rule | The container platform must enforce a minimum 15-character password length. |
☐ | SV-233089r599509_rule | The container platform must prohibit password reuse for a minimum of 10 generations. |
☐ | SV-233090r599581_rule | The container platform must enforce password complexity by requiring that at least one uppercase character be used. |
☐ | SV-233091r599583_rule | The container platform must enforce password complexity by requiring that at least one lowercase character be used. |
☐ | SV-233092r599585_rule | The container platform must enforce password complexity by requiring that at least one numeric character be used. |
☐ | SV-233093r599587_rule | The container platform must enforce password complexity by requiring that at least one special character be used. |
☐ | SV-233094r599589_rule | The container platform must require the change of at least 15 of the total number of characters when passwords are changed. |
☐ | SV-233095r599591_rule | For container platform using password authentication, the application must store only cryptographic representations of passwords. |
☐ | SV-233096r599509_rule | For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process. |
☐ | SV-233097r599509_rule | The container platform must enforce 24 hours (one day) as the minimum password lifetime. |
☐ | SV-233098r599509_rule | The container platform must enforce a 60-day maximum password lifetime restriction. |
☐ | SV-233101r599509_rule | The container platform must map the authenticated identity to the individual user or group account for PKI-based authentication. |
☐ | SV-233102r599593_rule | The container platform must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals. |
☐ | SV-233105r599595_rule | The container platform must provide an audit reduction capability that supports on-demand reporting requirements. |
☐ | SV-233106r599597_rule | The container platform must employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions. |
☐ | SV-233114r599599_rule | The container platform must separate user functionality (including user interface services) from information system management functionality. |
☐ | SV-233118r599601_rule | The container platform must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules. |
☐ | SV-233122r599603_rule | The container platform runtime must fail to a secure state if system initialization fails, shutdown fails, or aborts fail. |
☐ | SV-233123r599509_rule | The container platform must preserve any information necessary to determine the cause of the disruption or failure. |
☐ | SV-233125r599605_rule | The container platform runtime must isolate security functions from non-security functions. |
☐ | SV-233126r599509_rule | The container platform must never automatically remove or disable emergency accounts. |
☐ | SV-233127r599607_rule | The container platform must prohibit containers from accessing privileged resources. |
☐ | SV-233128r599705_rule | The container platform must prevent unauthorized and unintended information transfer via shared system resources. |
☐ | SV-233129r599611_rule | The container platform must restrict individuals' ability to launch organizationally defined denial-of-service (DoS) attacks against other information systems. |
☐ | SV-233133r599613_rule | The container platform must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries. |
☐ | SV-233142r599509_rule | The container platform must use cryptographic mechanisms to protect the integrity of audit tools. |
☐ | SV-233143r599509_rule | The container platform must notify system administrators and ISSO when accounts are created. |
☐ | SV-233144r599509_rule | The container platform must notify system administrators and ISSO when accounts are modified. |
☐ | SV-233145r599509_rule | The container platform must notify system administrators and ISSO for account disabling actions. |
☐ | SV-233146r599509_rule | The container platform must notify system administrators and ISSO for account removal actions. |
☐ | SV-233149r599509_rule | Access to the container platform must display an explicit logout message to user indicating the reliable termination of authenticated communication sessions. |
☐ | SV-233155r599509_rule | The container platform must terminate shared/group account credentials when members leave the group. |
☐ | SV-233156r599615_rule | The container platform must enforce organization-defined circumstances and/or usage conditions for organization-defined accounts. |
☐ | SV-233157r599509_rule | The container platform must automatically audit account-enabling actions. |
☐ | SV-233158r599509_rule | The container platform must notify system administrator and ISSO of account enabling actions. |
☐ | SV-233162r599617_rule | The container platform must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. |
☐ | SV-233163r599619_rule | Container images instantiated by the container platform must execute using least privileges. |
☐ | SV-233164r599509_rule | The container platform must audit the execution of privileged functions. |
☐ | SV-233165r599621_rule | The container platform must automatically lock an account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded. |
☐ | SV-233166r599712_rule | The container platform must provide the configuration for organization-identified individuals or roles to change the auditing to be performed on all components, based on all selectable event criteria within organization-defined time thresholds. |
☐ | SV-233168r599625_rule | The container platform must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements. |
☐ | SV-233169r599627_rule | Audit records must be stored at a secondary location. |
☐ | SV-233170r599629_rule | The container platform must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity. |
☐ | SV-233171r599631_rule | The container platform must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts. |
☐ | SV-233181r599509_rule | All audit records must use UTC or GMT time stamps. |
☐ | SV-233182r599509_rule | The container platform must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision. |
☐ | SV-233184r599633_rule | The container platform must prohibit the installation of patches and updates without explicit privileged status. |
☐ | SV-233185r599635_rule | The container platform runtime must prohibit the instantiation of container images without explicit privileged status. |
☐ | SV-233186r599509_rule | The container platform registry must prohibit installation or modification of container images without explicit privileged status. |
☐ | SV-233188r599724_rule | The container platform must enforce access restrictions for container platform configuration changes. |
☐ | SV-233189r599509_rule | The container platform must enforce access restrictions and support auditing of the enforcement actions. |
☐ | SV-233190r599509_rule | All non-essential, unnecessary, and unsecure DoD ports, protocols, and services must be disabled in the container platform. |
☐ | SV-233191r599639_rule | The container platform must prevent component execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage. |
☐ | SV-233192r599641_rule | The container platform registry must employ a deny-all, permit-by-exception (whitelist) policy to allow only authorized container images in the container platform. |
☐ | SV-233193r599509_rule | The container platform must require users to reauthenticate when organization-defined circumstances or situations require reauthentication. |
☐ | SV-233194r599643_rule | The container platform must require devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication. |
☐ | SV-233195r599509_rule | The container platform must be configured to use multi-factor authentication for user authentication. |
☐ | SV-233199r599645_rule | The container platform must allow the use of a temporary password for system logons with an immediate change to a permanent password. |
☐ | SV-233200r599647_rule | The container platform must prohibit the use of cached authenticators after an organization-defined time period. |
☐ | SV-233201r599649_rule | The container platform, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. |
☐ | SV-233202r599509_rule | The container platform must accept Personal Identity Verification (PIV) credentials from other federal agencies. |
☐ | SV-233206r599651_rule | The container platform must audit non-local maintenance and diagnostic sessions' organization-defined audit events associated with non-local maintenance. |
☐ | SV-233207r599717_rule | Container platform applications and Application Program Interfaces (API) used for nonlocal maintenance sessions must use FIPS-validated keyed-hash message authentication code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications. |
☐ | SV-233208r599720_rule | The container platform must configure web management tools and Application Program Interfaces (API) with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions. |
☐ | SV-233210r599509_rule | Vulnerability scanning applications must implement privileged access authorization to all container platform components, containers, and container images for selected organization-defined vulnerability scanning activities. |
☐ | SV-233211r599655_rule | The container platform must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. |
☐ | SV-233220r599509_rule | The container platform keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform. |
☐ | SV-233221r599657_rule | The container platform runtime must maintain separate execution domains for each container by assigning each container a separate address space. |
☐ | SV-233222r599659_rule | The container platform must protect against or limit the effects of all types of denial-of-service (DoS) attacks by employing organization-defined security safeguards. |
☐ | SV-233226r599661_rule | The container platform must maintain the confidentiality and integrity of information during preparation for transmission. |
☐ | SV-233227r599663_rule | The container platform must maintain the confidentiality and integrity of information during reception. |
☐ | SV-233228r599665_rule | The container platform must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. |
☐ | SV-233229r599509_rule | The container platform must implement organization-defined security safeguards to protect system CPU and memory from resource depletion and unauthorized code execution. |
☐ | SV-233230r599706_rule | The container platform must remove old components after updated versions have been installed. |
☐ | SV-233231r599707_rule | The container platform registry must remove old container images after updating versions have been made available. |
☐ | SV-233233r599671_rule | The container platform registry must contain the latest images with most recent updates and execute within the container platform runtime as authorized by IAVM, CTOs, DTMs, and STIGs. |
☐ | SV-233234r599673_rule | The container platform runtime must have updates installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs). |
☐ | SV-233242r599675_rule | The organization-defined role must verify correct operation of security functions in the container platform. |
☐ | SV-233243r599708_rule | The container platform must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days. Security functionality includes, but is not limited to, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. |
☐ | SV-233244r599722_rule | The container platform must provide system notifications to the system administrator and operational staff when anomalies in the operation of the organization-defined security functions are discovered. |
☐ | SV-233252r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to access security objects occur. |
☐ | SV-233253r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to access security levels occur. |
☐ | SV-233254r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur. |
☐ | SV-233255r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to modify privileges occur. |
☐ | SV-233256r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to modify security objects occur. |
☐ | SV-233257r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to modify security levels occur. |
☐ | SV-233258r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur. |
☐ | SV-233259r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to delete privileges occur. |
☐ | SV-233260r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to delete security levels occur. |
☐ | SV-233261r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to delete security objects occur. |
☐ | SV-233262r599509_rule | The container platform must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur. |
☐ | SV-233263r599726_rule | The container platform must generate audit records when successful/unsuccessful logon attempts occur. |
☐ | SV-233264r599509_rule | The container platform must generate audit record for privileged activities. |
☐ | SV-233265r599683_rule | The container platform audit records must record user access start and end times. |
☐ | SV-233266r599685_rule | The container platform must generate audit records when concurrent logons from different workstations and systems occur. |
☐ | SV-233267r599727_rule | The container platform runtime must generate audit records when successful/unsuccessful attempts to access objects occur. |
☐ | SV-233268r599509_rule | Direct access to the container platform must generate audit records. |
☐ | SV-233269r599728_rule | The container platform must generate audit records for all account creations, modifications, disabling, and termination events. |
☐ | SV-233270r599691_rule | The container runtime must generate audit records for all container execution, shutdown, restart events, and program initiations. |
☐ | SV-233271r599729_rule | The container platform must use a valid FIPS 140-2 approved cryptographic modules to generate hashes. |
☐ | SV-233273r599695_rule | Container platform components must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs. |
☐ | SV-233274r599730_rule | The container platform must be able to store and instantiate industry standard container images. |
☐ | SV-233275r599509_rule | The container platform must continuously scan components, containers, and images for vulnerabilities. |
☐ | SV-233276r599509_rule | The container platform must prohibit communication using TLS versions 1.0 and 1.1, and SSL 2.0 and 3.0. |
☐ | SV-233284r599699_rule | The container platform must validate certificates used for Transport Layer Security (TLS) functions by performing an RFC 5280-compliant certification path validation. |
☐ | SV-233285r599701_rule | The container platform must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use). |
☐ | SV-233289r599509_rule | The container platform must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality. |
☐ | SV-233290r599703_rule | The container platform must prohibit or restrict the use of protocols that transmit unencrypted authentication information or use flawed cryptographic algorithms for transmission. |