UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Authentication files for the container platform must be protected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233070 SRG-APP-000133-CTR-000310 SV-233070r599509_rule Medium
Description
The secure configuration of the container platform must be protected by disallowing changing to be implemented by non-privileged users. Changes to the container platform can introduce security risks and stability issues and undermine change management procedures. To secure authentication files from non-privileged user modification can be enforced using file ownership and permissions. Examples of authentication files are keys, certificates, and tokens.
STIG Date
Container Platform Security Requirements Guide 2020-11-24

Details

Check Text ( C-36006r598846_chk )
Review the container platform to verify that authentication files cannot be modified by non-privileged users.

If non-privileged users can modify key and certificate files, this is a finding.
Fix Text (F-35974r598847_fix)
Configure the container platform to only allow authentication file modifications by privileged users.