The container platform must be built from verified packages.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-233064 | SRG-APP-000131 | SRG-APP-000131-CTR-000280 | SV-233064r981843_rule | 2024-12-05 | 2 |
Description |
---|
It is important to patch and upgrade the container platform when patches and upgrades are available. More important is to get these patches and upgrades from a known source. To validate the authenticity of any patches and upgrades before installation, the container platform must check that the files are digitally signed by sources approved by the organization. |
ℹ️ Check |
---|
Review the container platform configuration to verify it has been built from packages that are digitally signed by known and approved sources. If the container platform was built from packages that are not digitally signed or are from unknown or nonapproved sources, this is a finding. |
✔️ Fix |
---|
Rebuild the container platform from verified packages that are digitally signed by known and approved sources. |