Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-233263 | SRG-APP-000503-CTR-001275 | SV-233263r961824_rule | Medium |
Description |
---|
The container platform and its components must generate audit records when successful and unsuccessful logon attempts occur. The information system can determine if an account is compromised or is in the process of being compromised and can take actions to thwart the attack. All the components must use the same standard so that the events can be tied together to understand what took place within the overall container platform. This must establish, correlate, and help assist with investigating the events relating to an incident, or identify those responsible. |
STIG | Date |
---|---|
Container Platform Security Requirements Guide | 2024-05-28 |
Check Text ( C-36199r601882_chk ) |
---|
Review the container platform configuration for audit logon events. Ensure audit policy for successful and unsuccessful logon events are enabled. Verify events are written to the log. Validate system documentation is current. If logon attempts do not generate log records, this is a finding. |
Fix Text (F-36167r601277_fix) |
---|
Configure the container platform registry, keystore, and runtime to generate audit log for successful and unsuccessful logon for any all accounts and services. Revise all applicable system documentation. |