Skip to content

Commit

Permalink
Merge pull request #10290 from jhrozek/STIG-SC-39
Browse files Browse the repository at this point in the history
OCP4 STIG: SRG-APP-000431-CTR-001065 is inherently met
  • Loading branch information
jhrozek authored Mar 9, 2023
2 parents 1b4d9d0 + 44ff93a commit 2dfef9d
Showing 1 changed file with 18 additions and 0 deletions.
18 changes: 18 additions & 0 deletions controls/srg_ctr/SRG-APP-000431-CTR-001065.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,3 +5,21 @@ controls:
title: {{{ full_name }}} runtime must maintain separate execution domains for
each container by assigning each container a separate address space.
status: inherently met
artifact_description: |-
Supporting evidence is in the follwing documenation
https://docs.openshift.com/container-platform/latest/authentication/using-rbac.html#rbac-default-projects_using-rbac
https://docs.openshift.com/container-platform/latest/authentication/managing-security-context-constraints.html
https://docs.openshift.com/container-platform/latest/authentication/managing-security-context-constraints.html#examining-a-security-context-constraints-object_configuring-internal-oauth
status_justification: |-
The control is met because SELinux and namespaces are enabled by default.
https://docs.openshift.com/container-platform/latest/authentication/using-rbac.html#rbac-default-projects_using-rbac
https://docs.openshift.com/container-platform/latest/authentication/managing-security-context-constraints.html
https://docs.openshift.com/container-platform/latest/authentication/managing-security-context-constraints.html#examining-a-security-context-constraints-object_configuring-internal-oauth
- OpenShift comes with a number of default projects, and projects starting with `openshift-` are considered essential to users. Resources in OpenShift should be segregated by project, to allow for security controls to be applied at that level and to make it easier to manage resources. Review projects to ensure that only system managed resources belong in default projects.
oc project < project-name > && oc get all
- By default, OpenShift also sets a SCC for all authenticated users. Specifically, it sets the restricted SCC by default, which denies access to all host features and requires pods to be run with a UID and SELinux context that are allocated to the project.
To get all SCC's:
oc get scc
To describe an SCC, including which users, service accounts, and groups SCC is applied to:
oc describe scc <scc-name>

0 comments on commit 2dfef9d

Please sign in to comment.