Description: (1) Before containers are deployed, the goal of such a deployment (e.g. scaling, availability, disposable containers for safety or CI/CD) SHOULD be determined so that all the security- related aspects of installation, operation, and decommissioning can be planned. (2) The planning SHOULD also take into account the operational overhead resulting from container deployment or mixed operation. (3) The planning MUST be adequately documented
Levels:Automated: no
No rules selected
Description: (1) The management of containers MUST ONLY be carried out in line with appropriate planning. (2) This planning MUST cover the entire lifecycle from commissioning to decommissioning, including operation and updates. (3) When planning container management, it MUST be taken into account that the creator of a container is to be considered like an administrator due to the effects they have on parts of the operation. (4) Containers MUST be started, stopped, and monitored via the management software used.
Levels:Automated: no
No rules selected
Description: (1) In the case of containerised IT systems, consideration MUST be given to how containerisation affects the IT systems and applications operated, in particular the management and suitability of the applications. (2) Based on the protection needs of the applications, it MUST be checked whether the requirements for isolation and encapsulation of the containerised IT systems, virtual networks, and operated applications are sufficiently fulfilled. (3) The mechanisms of the operating system in question SHOULD be included in this check. (4) Since the host performs the function of a network component for virtual networks, the modules of the sub-layers NET.1 Networks and NET.3 Network Components MUST be considered accordingly. (5) Logical and overlay networks MUST also be considered and modelled. (6) Furthermore, the containerised IT systems used MUST meet the requirements at hand regarding availability and data throughput.(7) During operation, the performance and the state of the containerised IT systems SHOULD be monitored (health checks).
Levels:Automated: yes
Selections:Description: The process for the provision and distribution of images MUST be planned and appropriately documented.
Levels:Automated: no
No rules selected
Description: (1) Networks for the administration of the host, the administration of the containers, and their access networks MUST be separated according to the protection needs at hand. (2) In principle, at least the administration of the host SHOULD only be possible from the administration network. (3) Only the communication relationships necessary for operation SHOULD be allowed.
Levels:Automated: yes
Selections:Description: (1) It MUST be ensured that all images used originate from trusted sources. (2) The creator of each image MUST be clearly identifiable. (3) Sources MUST be selected on the basis of whether the creator of a given image regularly checks the included software for security problems, fixes and documents them, and provides corresponding guarantees to customers. (4) The utilised version of base images MUST NOT be deprecated. (5) Unique version numbers MUST be provided. (6) If an image with a newer version number is available, a patch and change management process MUST check whether and how it can be rolled out
Levels:Automated: yes
No rules selected
Description: Container logging data MUST be stored outside of the respective container (on the container host at minimum)
Levels:Automated: no
No rules selected
Description: (1) Access data MUST be stored and managed in such a way that only authorised persons and containers can access it. (2) In particular, it MUST be ensured that access data is only stored in specially protected locations and not in images. (3) The access data management mechanisms provided by container service management software SHOULD be used. (4) At minimum, the following credentials MUST be stored securely: • Passwords of any accounts • API keys for services used by the application • Keys for symmetric encryption • Private keys for public key authentication
Levels:Automated: yes
No rules selected
Description: (1) An application or service to be operated in a container SHOULD be suitable for such operation. (2) It SHOULD be considered that containers can often be terminated unexpectedly, with corresponding consequences for the application run therein. (3) The results of the checking described under SYS.1.6.A3 Secure Use of Containerised IT Systems SHOULD be documented in a comprehensible manner.
Levels:Automated: no
No rules selected
Description: (1) A policy SHOULD be established and applied that specifies the requirements for container operation and permitted images. (2) The policy SHOULD also include requirements for the operation and deployment of images.
Levels:Automated: no
No rules selected
Description: (1) Each container SHOULD only provide one service at a time.
Levels:Automated: no
No rules selected
Description: The sources of images that have been classified as trusted and SHOULD be adequately documented along with the corresponding reasons. In addition, the process of how images or the software components contained in an image are obtained from trusted sources and eventually deployed to a productive environment SHOULD be adequately documented. Images used SHOULD have metadata that makes their function and history traceable. Digital signatures SHOULD secure each image against modification.
Levels:Automated: no
No rules selected
Description: All images for productive operation SHOULD undergo a test and release process in the same way as software products in accordance with module OPS.1.1.6 Software Tests and Approvals
Levels:Automated: no
No rules selected
Description: (1)When establishing a concept for patch and change management according to OPS.1.1.3 Patch and Change Management, it SHOULD be decided when and how the updates of images or the software or service operated are to be rolled out. (2)For persistent containers, checks SHOULD be made as to whether an update of a container is more appropriate than completely re- provisioning the container in exceptional cases.
Levels:Automated: no
No rules selected
Description: Resources on the host system such as CPU, volatile and persistent memory, and network bandwidth SHOULD be appropriately reserved and limited for each container. How the system should react if these limits are exceeded SHOULD be defined and documented.
Levels:Automated: no
No rules selected
Description: In principle, administrative access from a container to the container host and vice versa SHOULD be considered as administrative remote access. Remote administrative access SHOULD NOT be established from a container to the container host. Application containers SHOULD NOT contain remote maintenance access points. Administrative access to application containers SHOULD always be carried out via the container runtime.
Levels:Automated: no
No rules selected
Description: A container runtime and any instantiated containers SHOULD only be executed by a non- privileged system account that does not have (and cannot gain) elevated rights to the container service or host operating system. The container runtime SHOULD be encapsulated by additional measures, such as using the virtualisation extensions of CPUs. If containers are to take over tasks of the host system in exceptional cases, privileges on the host system SHOULD be limited to the minimum necessary. Exceptions SHOULD be adequately documented.
Levels:Automated: no
No rules selected
Description: (1) System accounts within a container SHOULD have no permissions on the host system. (2) If such authorisation is required for operational reasons, it SHOULD only apply to the data and system access that is absolutely necessary. (3) The account in the container that is necessary to exchange data SHOULD be known in the host system
Levels:Automated: yes
Selections:Description: (1) Containers SHOULD ONLY be able to access the mass storage and directories necessary for operation. (2) Permissions SHOULD only be explicitly assigned where needed. (3) If the container runtime for a container includes local storage, the access rights in the file system SHOULD be restricted to the service account of the container. (4) If network storage is used, the permissions SHOULD be set on the network storage itself
Levels:Automated: yes
No rules selected
Description: (1) Descriptions of container configuration data SHOULD be versioned. (2) Changes SHOULD be documented in a comprehensible manner.
Levels:Automated: yes
No rules selected
Description: (1) Extended policies SHOULD restrict the permissions of containers. (2) Mandatory Access Control (MAC) or a comparable technology SHOULD enforce these policies. (3) At minimum, policies SHOULD restrict the following types of access: • Incoming and outgoing network connections • File system access attempts • Kernel requests (syscalls) (4) A runtime SHOULD start containers in such a way that the kernel of the host system prevents all activities of the containers that are not allowed by the relevant policy (e.g. by setting up local packet filters or revoking permissions), or at least reports violations appropriately.
Levels:Automated: yes
Selections:Description: In order to have containers available for later investigation in case they are needed, an image of each container's state SHOULD be created according to specified rules.
Levels:Automated: no
No rules selected
Description: Containers SHOULD not be able to change their file system during runtime. File systems SHOULD not be integrated with write permissions.
Levels:Automated: no
No rules selected
Description: The behaviour of containers and the applications or services running in them SHOULD be monitored. Deviations from normal behaviour SHOULD be noticed and reported. The reports SHOULD be handled appropriately in a centralised process for security incident handling. At minimum, the behaviour to be monitored SHOULD cover: • Network connections • Created processes • File system access attempts • Kernel requests (syscalls)
Levels:Automated: no
No rules selected
Description: In cases involving containerised applications with high availability requirements, the necessary level of availability SHOULD be defined (e.g. redundant at the host level)
Levels:Automated: no
No rules selected
Description: If further isolation and encapsulation of containers is required, the following measures SHOULD be considered for increased effectiveness: • Fixed assignment of containers to container hosts • Execution of the individual containers and/or the container host by means of hypervisors • Fixed assignment of a single container to a single container host
Levels:Automated: no
No rules selected