IVS-04: Is every host and guest OS, hypervisor, or infrastructure control plane hardened
(according to their respective best practices) and supported by technical controls
as part of a security baseline?
Supporting technical controls should aid situations when only the ports, protocols, and services necessary to meet business needs are provided. Such controls should be based on benchmarks (e.g., CIS).
Implement anti-malware, file integrity monitoring, and logging, and utilize hardware rooted trust in virtual trusted platform modules (vTPMs).
Whenever possible, organizations should use minimalistic, container-specific host operating systems (OSs), with all other services and functionality disabled—and with read-only file systems and other hardening practices employed to reduce attack surfaces. a. Hosts that run containers should only run containers and not other apps—such as web servers or databases—outside of containers. b. Hosts that run containers should be continuously scanned for vulnerabilities and updated promptly. c. The host OS should not run unnecessary system services. d. Access to the container host should be based on the need-to-know and least privilege principles. e. File integrity monitoring and host intrusion detection should be leveraged for containers.
Control implemented
Control ownership
Description
Harden host and guest OS, hypervisor or infrastructure control plane
according to their respective best practices, and supported by technical controls,
as part of a security baseline.