Authentication files for the container platform must be protected.
Overview
Finding ID
Version
Rule ID
IA Controls
Severity
V-233070
SRG-APP-000133-CTR-000310
SV-233070r960960_rule
Medium
Description
The secure configuration of the container platform must be protected by disallowing changing to be implemented by non-privileged users. Changes to the container platform can introduce security risks and stability issues and undermine change management procedures. To secure authentication files from non-privileged user modification can be enforced using file ownership and permissions.
Examples of authentication files are keys, certificates, and tokens.