UCF STIG Viewer Logo

The container platform must remove old components after updated versions have been installed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233230 SRG-APP-000454-CTR-001110 SV-233230r601824_rule Medium
Description
Previous versions of container platform components that are not removed from the container platform after updates have been installed may be exploited by adversaries by causing older components to execute which contain vulnerabilities. When these components are deleted, the likelihood of this happening is removed.
STIG Date
Container Platform Security Requirements Guide 2021-12-14

Details

Check Text ( C-36166r601823_chk )
Review container platform registry documentation and configuration to determine if organization-defined images contains latest approved vendor software image version.

If organization-defined images do not contain the latest approved vendor software image version, this is a finding.

Review container platform registry documentation and configuration to determine if organization-defined images are removed after updated versions have been installed.

If organization-defined images are not removed after updated versions have been installed, this is a finding.

Review container platform runtime documentation and configuration to determine if organization-define images are executing latest image version from the container platform registry.

If container platform runtime is not executing latest organization-defined images from the container platform registry, this is a finding.
Fix Text (F-36134r601863_fix)
Configure the container platform registry to update organization-defined images with current approved vendor version and remove obsolete images after updated versions have been installed. Configure the container platform runtime to execute latest organization-defined images from the container platform registry.