The container platform must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-233118 | SRG-APP-000219-CTR-000550 | SV-233118r1043178_rule | CCI-001184 | high |
| Description | ||||
| The container platform is responsible for pulling images from trusted sources and placing those images into its registry. To protect the transmission of images, the container platform must use FIPS-validated 140-2 or 140-3 cryptographic modules. This added protection defends against main-in-the-middle attacks where malicious code could be added to an image during transmission. | ||||
| STIG | Date | |||
| Container Platform Security Requirements Guide | 2025-05-15 | |||
Details
Check Text (C-233118r1043178_chk)
Review the container platform configuration to determine if FIPS-validated 140-2 or 140-3 cryptographic modules are being used to protect container images during transmission.
If FIPS-validated 140-2 or 140-3 cryptographic modules are not being use, this is a finding.
Fix Text (F-36022r600842_fix)
Configure the container platform to use FIPS-validated 140-2 or 140-3 cryptographic modules to protect container images during transmission.