UCF STIG Viewer Logo

The container platform must prohibit or restrict the use of protocols that transmit unencrypted authentication information or use flawed cryptographic algorithms for transmission.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233290 SRG-APP-000645-CTR-001410 SV-233290r601860_rule High
Description
The use of secure ports, protocols and services within the container platform must be controlled and conform to the PPSM CAL. Those ports, protocols, and services that fall outside the PPSM CAL must be blocked by the runtime. Instructions on the PPSM can be found in DoD Instruction 8551.01 Policy. Unsecure protocols for transmission will expose the information system data and information, making the session susceptible to manipulation, hijacking, and man-in-the middle attacks.
STIG Date
Container Platform Security Requirements Guide 2021-12-14

Details

Check Text ( C-36226r601859_chk )
Review the container platform configuration to verify that container platform is not using protocols that transmit authentication data unencrypted and that the container platform is not using flawed cryptographic algorithms for transmission.

If the container platform is using protocols to transmit authentication data unencrypted or is using flawed cryptographic algorithms, this is a finding.
Fix Text (F-36194r601358_fix)
Configure the container platform to use protocols that transmit authentication data encrypted and to use cryptographic algorithms that are not flawed.