Skip to main content
GSA Logo

Cloud Economics

About MCaaS

Security Guardrails

MCaaS Application Security Guardrails

Below is an application security checklist recommended by OCISO DevSecOps team for MCaaS application. It covers the key security requirements and shows the stopper controls for MCaaS applications along with recommended security solutions/approaches for some of the security needs of your application. However, please note that this is not the complete list to meet all the NIST control requirements as the purpose of this document is not to provide the complete list.

S.NoDescriptionAssociated Control in CRM
1Ensure all your containers are free of fixable critical and high vulnerability. </br> You can see the twistlock scan result of your container image in jenkins pipeline. In the near future GSA OCISO DevSecOps team will fail deployment for containers with high and critical findings.RA-5
2Ensure your container images are built with least functionality, minimal software and packages/dependencies required for application.CM-7(1)
3Ensure your container images aligns with GSA Container image security benchmarkCM -2
4Ensure a trusted registry is used to pull the container image. Use GSA base container images, when available. (In the near future GSA OCISO DevSecOps team will provide GSA trusted internal registry and base images (on best effort basics) ).RA-5 & PL-8
5Write down your calico policy based on your micro service and which micro service needs connection to whatAC-4
6Ensure your application dependencies, libraries and open source component is free of known and fixable vulnerabilityRA-5
7Ensure open source code and components used in your application is well maintained and supported. Be mindful of software supply chain risk associated with un-managed , outdated and unknown provider/community of open source code.Use internal reusable components and libraries in application code, if available.RA-5 & SA -11 (1)
8Perform static code scanning of your application and remediate the findings.SA -11 (1)
9Ensure MFA on your web application. GSA SecureAuth , OKTA, login.gov, Max.gov are some commonly used solutions.IA-2 (11)
10Ensure your sensitive data (Eg: PCI/PII) is encrypted at the application layer. </br> Note: If your application doesn’t have PCI/PII or business sensitive data, volume level encryption provided by FCS data services or AWS using KMS key will suffice. Combination of AWS Encryption SDK and KMS can be utilized for application level encryption of sensitive fields.SC (28) (1)
11Develop a process for continuously replacing your container with latest patched vulnerability free containers.RA-5 & SA-10
12Ensure all COTS or open source software/tools running in container are approved by CTO and listed in GEARPL-8
13Update COTS product or open source tool running in container to the latest releaseRA-5
14Ensure external connection, database connection, API calls etc are over encrypted connection like TLS/https. </br> Note: Connections between pods/containers are over TLS by default because of uses of ISTIO in MCaaS platform.SC-8
15Use AWS Secret manager instead of storing credentials or other secrets in containers images or docker files etc..SA-10
16Generate audit logs from containersAU-2
17Generate logs from applications running in containers and standardize the process for application log review.AU-12 & AU-2
18Ensure your production URL is scanned by NetSparker and findings are remediated.RA-5
test