The container platform must prohibit or restrict the use of protocols that transmit unencrypted authentication information or use flawed cryptographic algorithms for transmission.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
highV-233290SRG-APP-000645SRG-APP-000645-CTR-001410SV-233290r961911_rule2024-12-052
Description
The use of secure ports, protocols and services within the container platform must be controlled and conform to the PPSM CAL. Those ports, protocols, and services that fall outside the PPSM CAL must be blocked by the runtime. Instructions on the PPSM can be found in DoD Instruction 8551.01 Policy. Unsecure protocols for transmission will expose the information system data and information, making the session susceptible to manipulation, hijacking, and man-in-the middle attacks.
ℹ️ Check
Review the container platform configuration to verify that container platform is not using protocols that transmit authentication data unencrypted and that the container platform is not using flawed cryptographic algorithms for transmission. If the container platform is using protocols to transmit authentication data unencrypted or is using flawed cryptographic algorithms, this is a finding.
✔️ Fix
Configure the container platform to use protocols that transmit authentication data encrypted and to use cryptographic algorithms that are not flawed.