Authentication files for the container platform must be protected.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
|---|---|---|---|---|---|---|
| medium | V-233070 | SRG-APP-000133 | SRG-APP-000133-CTR-000310 | SV-233070r960960_rule | 2025-05-15 | 2 |
| Description |
|---|
| The secure configuration of the container platform must be protected by disallowing changing to be implemented by non-privileged users. Changes to the container platform can introduce security risks and stability issues and undermine change management procedures. To secure authentication files from non-privileged user modification can be enforced using file ownership and permissions. Examples of authentication files are keys, certificates, and tokens. |
| ℹ️ Check |
|---|
| Review the container platform to verify that authentication files cannot be modified by non-privileged users. If non-privileged users can modify key and certificate files, this is a finding. |
| ✔️ Fix |
|---|
| Configure the container platform to only allow authentication file modifications by privileged users. |