File: SRG-APP-000441-CTR-001090.yml

package info (click to toggle)
scap-security-guide 0.1.76-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 110,644 kB
  • sloc: xml: 241,883; sh: 73,777; python: 32,527; makefile: 27
file content (24 lines) | stat: -rw-r--r-- 1,066 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
controls:
- id: SRG-APP-000441-CTR-001090
  levels:
  - medium
  title: {{{ full_name }}} must maintain the confidentiality and integrity of
    information during preparation for transmission.
  related_rules:
  - api_server_client_ca
  - api_server_etcd_ca
  - api_server_tls_cert
  - api_server_tls_private_key
  - etcd_peer_cert_file
  - etcd_peer_key_file
  - kubelet_configure_tls_cert
  - kubelet_configure_tls_cert_pre_4_9
  - kubelet_configure_tls_key
  - kubelet_configure_tls_key_pre_4_9
  - routes_protected_by_tls
  status: inherently met
  status_justification: |-
    The OpenShift Container Platform uses TLS encryption for communication with the internal components. Many of these components support additional levels of configuration, such as allowed cyphers and minimum TLS levels. Although not all components support this additional configuration, they still use TLS for encryption of the internal communications.
  artifact_description: |-
    Supporting evidence is in the following documentation
    https://access.redhat.com/articles/5348961