Check: SRG-APP-000243-CTR-000595
Container Platform SRG:
SRG-APP-000243-CTR-000595
(in versions v1 r5 through v1 r1)
Title
The container platform must prohibit containers from accessing privileged resources. (Cat II impact)
Discussion
Containers images instantiated within the container platform may request access to host system resources. Access to privileged resources can allow for unauthorized and unintended transfer of information, but in some cases, these resources may be needed for the service being offered by the container. By default, containers should be denied instantiation when privileged system resources are requested and granted only after approval has been given. When access to privileged resources is necessary for a container, a new policy for execution should be written for the container. The default behavior must not give containers privileged access to host system resources. Examples of system resources that should be protected are kernel namespaces and host system sensitive directories such as /etc and /usr.
Check Content
Review documentation and configuration to determine if the container platform disallows instantiation of containers trying to access host system privileged resources. If the container platform does not block containers requesting host system privileged resources, this is a finding.
Fix Text
Configure the container platform to block instantiation of containers requesting access to host system-privileged resources.
Additional Identifiers
Rule ID: SV-233127r879649_rule
Vulnerability ID: V-233127
Group Title: SRG-APP-000243
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001090 |
The information system prevents unauthorized and unintended information transfer via shared system resources. |
Controls
Number | Title |
---|---|
SC-4 |
Information In Shared Resources |