UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The container platform must use FIPS validated cryptographic mechanisms to protect the integrity of log information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233063 SRG-APP-000126-CTR-000275 SV-233063r879583_rule Medium
Description
To fully investigate an incident and to have trust in the audit data that is generated, it is important to put in place data protections. Without integrity protections, unauthorized changes may be made to the audit files and reliable forensic analysis and discovery of the source of malicious system activity may be degraded. Although digital signatures are one example of protecting integrity, this control is not intended to cause a new cryptographic hash to be generated every time a record is added to a log file. Integrity protections can also be implemented by using cryptographic techniques for security function isolation and file system protections to protect against unauthorized changes.
STIG Date
Container Platform Security Requirements Guide 2023-11-30

Details

Check Text ( C-35999r601673_chk )
Review the container platform configuration to determine if FIPS-validated cryptographic mechanisms are being used to protect the integrity of log information.

If FIPS-validated cryptographic mechanisms are not being used to protect the integrity of log information, this is a finding.
Fix Text (F-35967r600677_fix)
Configure the container platform to use FIPS-validated cryptographic mechanisms to protect the integrity of log information.