UCF STIG Viewer Logo

The container platform must limit privileges to the container platform registry.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233066 SRG-APP-000133-CTR-000290 SV-233066r601699_rule Medium
Description
To control what is instantiated within the container platform, it is important to control access to the registry. Without this control, container images can be introduced and instantiated by accident or on container platform startup. Without control of the registry, security measures put in place for the runtime can be bypassed meaning the controls of approval and testing are also bypassed. Only those individuals and roles approved by the organization can have access to the container platform registry.
STIG Date
Container Platform Security Requirements Guide 2021-12-14

Details

Check Text ( C-36002r601872_chk )
Review the container platform registry configuration to determine if the level of access to the registry is controlled through user privileges.

Attempt to perform registry operations to determine if the privileges are enforced.

If the container platform registry is not limited through user privileges or the user privileges are not enforced, this is a finding.
Fix Text (F-35970r600686_fix)
Configure the container platform to use and enforce user privileges when accessing the container platform registry.