Check: SRG-APP-000431-CTR-001065
Container Platform SRG:
SRG-APP-000431-CTR-001065
(in versions v2 r2 through v1 r0.1)
Title
The container platform runtime must maintain separate execution domains for each container by assigning each container a separate address space. (Cat II impact)
Discussion
Container namespace access is limited upon runtime execution. Each container is a distinct process so that communication between containers is performed in a manner controlled through security policies that limits the communication so one container cannot modify another container. Different groups of containers with different security needs should be deployed in separate namespaces as a first level of isolation. Namespaces are a key boundary for network policies, orchestrator access control restrictions, and other important security controls. Separating workloads into namespaces can help contain attacks and limit the impact of mistakes or destructive actions by authorized users.
Check Content
Review container platform runtime documentation and configuration is maintaining a separate execution domain for each executing process. Different groups of applications, and services with different security needs, should be deployed in separate namespaces as a first level of isolation. If container platform runtime is not configured to execute processes in separate domains and namespaces, this is a finding. If namespaces use defaults, this is a finding.
Fix Text
Deploy a container platform runtime capable of maintaining a separate execution domain and namespace for each executing process. Create a namespace for each containers, defining them as logical groups.
Additional Identifiers
Rule ID: SV-233221r961608_rule
Vulnerability ID: V-233221
Group Title: SRG-APP-000431
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002530 |
Maintain a separate execution domain for each executing system process. |
Controls
Number | Title |
---|---|
SC-39 |
Process Isolation |