The container platform must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
high | V-233118 | SRG-APP-000219 | SRG-APP-000219-CTR-000550 | SV-233118r1043178_rule | 2024-12-05 | 2 |
Description |
---|
The container platform is responsible for pulling images from trusted sources and placing those images into its registry. To protect the transmission of images, the container platform must use FIPS-validated 140-2 or 140-3 cryptographic modules. This added protection defends against main-in-the-middle attacks where malicious code could be added to an image during transmission. |
ℹ️ Check |
---|
Review the container platform configuration to determine if FIPS-validated 140-2 or 140-3 cryptographic modules are being used to protect container images during transmission. If FIPS-validated 140-2 or 140-3 cryptographic modules are not being use, this is a finding. |
✔️ Fix |
---|
Configure the container platform to use FIPS-validated 140-2 or 140-3 cryptographic modules to protect container images during transmission. |