Check: SRG-APP-000431-CTR-001065
Container Platform SRG:
SRG-APP-000431-CTR-001065
(in versions v1 r5 through v1 r1)
Title
The container platform runtime must maintain separate execution domains for each container by assigning each container a separate address space. (Cat II impact)
Discussion
Container namespace access is limited upon runtime execution. Each container is a distinct process so that communication between containers is performed in a manner controlled through security policies that limits the communication so one container cannot modify another container. Different groups of containers with different security needs should be deployed in separate namespaces as a first level of isolation. Namespaces are a key boundary for network policies, orchestrator access control restrictions, and other important security controls. Separating workloads into namespaces can help contain attacks and limit the impact of mistakes or destructive actions by authorized users.
Check Content
Review container platform runtime documentation and configuration is maintaining a separate execution domain for each executing process. Different groups of applications, and services with different security needs, should be deployed in separate namespaces as a first level of isolation. If container platform runtime is not configured to execute processes in separate domains and namespaces, this is a finding. If namespaces use defaults, this is a finding.
Fix Text
Deploy a container platform runtime capable of maintaining a separate execution domain and namespace for each executing process. Create a namespace for each containers, defining them as logical groups.
Additional Identifiers
Rule ID: SV-233221r879802_rule
Vulnerability ID: V-233221
Group Title: SRG-APP-000431
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002530 |
The information system maintains a separate execution domain for each executing process. |
Controls
Number | Title |
---|---|
SC-39 |
Process Isolation |