File: SRG-APP-000148-CTR-000345.yml

package info (click to toggle)
scap-security-guide 0.1.76-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 110,644 kB
  • sloc: xml: 241,883; sh: 73,777; python: 32,527; makefile: 27
file content (24 lines) | stat: -rw-r--r-- 1,036 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
controls:
- id: SRG-APP-000148-CTR-000345
  levels:
  - medium
  title: {{{ full_name }}} must uniquely identify and authenticate processes
    acting on behalf of the users.
  related_rules:
  - idp_is_configured
  - ocp_idp_no_htpasswd
  - kubeadmin_removed
  status: inherently met
  status_justification: |-
    OpenShift does not execute containers with a user's account, as users
    of OpenShift do not have accounts on the host operating system. Pods
    are executed using UIDs that do not exist on the system and have no
    privileges on the host system at all. It is deliberately isolated
    further per logical namespace to allow for a mapping of UIDs to
    applications within the context of the API, without allowing for UID
    collision across logical namespaces.

    For more background information, see: https://cloud.redhat.com/blog/a-guide-to-openshift-and-uids
  artifact_description: |-
    Supporting evidence is in the following documentation:
    https://cloud.redhat.com/blog/a-guide-to-openshift-and-uids