The container platform must prohibit or restrict the use of protocols that transmit unencrypted authentication information or use flawed cryptographic algorithms for transmission.

STIG ID: SRG-APP-000645-CTR-001410  |  SRG: SRG-APP-000645 |  Severity: high |  CCI: CCI-000382 |  Vulnerability Id: V-233290

Vulnerability Discussion

The use of secure ports, protocols and services within the container platform must be controlled and conform to the PPSM CAL. Those ports, protocols, and services that fall outside the PPSM CAL must be blocked by the runtime. Instructions on the PPSM can be found in DoD Instruction 8551.01 Policy.

Unsecure protocols for transmission will expose the information system data and information, making the session susceptible to manipulation, hijacking, and man-in-the middle attacks.

Check

Review the container platform configuration to verify that container platform is not using protocols that transmit authentication data unencrypted and that the container platform is not using flawed cryptographic algorithms for transmission.

If the container platform is using protocols to transmit authentication data unencrypted or is using flawed cryptographic algorithms, this is a finding.

Fix

Configure the container platform to use protocols that transmit authentication data encrypted and to use cryptographic algorithms that are not flawed.