Skip to content

Commit

Permalink
Merge pull request #10614 from jhrozek/SRG-APP-000441-CTR-001090
Browse files Browse the repository at this point in the history
SRG-APP-000441-CTR-001090,SRG-APP-000442-CTR-001095: Add justification to a rule that's inherently met
  • Loading branch information
rhmdnd authored Jun 8, 2023
2 parents c2d263a + ec53b8b commit f283075
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 2 deletions.
7 changes: 6 additions & 1 deletion controls/srg_ctr/SRG-APP-000441-CTR-001090.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ controls:
- medium
title: {{{ full_name }}} must maintain the confidentiality and integrity of
information during preparation for transmission.
rules:
related_rules:
- api_server_client_ca
- api_server_etcd_ca
- api_server_tls_cert
Expand All @@ -17,3 +17,8 @@ controls:
- kubelet_configure_tls_key_pre_4_9
- routes_protected_by_tls
status: inherently met
status_justification: |-
The OpenShift Container Platform uses TLS encryption for communication with the internal components. Many of these components support additional levels of configuration, such as allowed cyphers and minimum TLS levels. Although not all components support this additional configuration, they still use TLS for encryption of the internal communications.
artifact_description: |-
Supporting evidence is in the following documentation
https://access.redhat.com/articles/5348961
7 changes: 6 additions & 1 deletion controls/srg_ctr/SRG-APP-000442-CTR-001095.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ controls:
- medium
title: {{{ full_name }}} must maintain the confidentiality and integrity of
information during reception.
rules:
related_rules:
- api_server_client_ca
- api_server_etcd_ca
- api_server_tls_cert
Expand All @@ -15,3 +15,8 @@ controls:
- kubelet_configure_tls_key
- routes_protected_by_tls
status: inherently met
status_justification: |-
The OpenShift Container Platform uses TLS encryption for communication with the internal components. Many of these components support additional levels of configuration, such as allowed cyphers and minimum TLS levels. Although not all components support this additional configuration, they still use TLS for encryption of the internal communications.
artifact_description: |-
Supporting evidence is in the following documentation
https://access.redhat.com/articles/5348961

0 comments on commit f283075

Please sign in to comment.