UCF STIG Viewer Logo

Authentication files for the container platform must be protected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233070 SRG-APP-000133-CTR-000310 SV-233070r600699_rule Medium
Description
The secure configuration of the container platform must be protected by disallowing changing to be implemented by non-privileged users. Changes to the container platform can introduce security risks and stability issues and undermine change management procedures. To secure authentication files from non-privileged user modification can be enforced using file ownership and permissions. Examples of authentication files are keys, certificates, and tokens.
STIG Date
Container Platform Security Requirements Guide 2021-12-14

Details

Check Text ( C-36006r600697_chk )
Review the container platform to verify that authentication files cannot be modified by non-privileged users.

If non-privileged users can modify key and certificate files, this is a finding.
Fix Text (F-35974r600698_fix)
Configure the container platform to only allow authentication file modifications by privileged users.