Skip to main content

CCC Container Registry

Container Registry is a repository for storing, managing and distributing container images. It acts as a hub in the container ecosystem, enabling developers to push, pull, version, and share container images efficiently and securely.

Release Details

Version:
DEV
Assurance Level:
Release Manager:
DB
Development Build

Contributors

DT
Development Team

Change Log

  • Development build - no formal changelog available

Capabilities

IDTitleDescriptionThreat Mappings
CCC.CntrReg.F01Image StorageAbility to upload and securely store container images and image metadata.
0
CCC.CntrReg.F02Private RepositoriesSupport for creating container image repositories that are restricted and only accessible by authorized users or services.
0
CCC.CntrReg.F03Public RepositoriesSupport for creating container image repositories that are open to the public. These repositories are used mainly for sharing container images.
0
CCC.CntrReg.F04Lifecycle PoliciesSupports defining of policies for automatic expiry of unused or outdated images to manage storage effectively.
1
CCC.CntrReg.F05Image ScanningProvides vulnerability scanning for container images (built-in or through integration to scanning services) to detect security issues and generate reports for known CVEs (Common Vulnerabilities and Exposures).
1
CCC.CntrReg.F06Integration with CI/CD ToolingSeamlessly integrates with CI/CD pipelines to automate pushing and pulling of container images.
0
CCC.CntrReg.F07Caching of ImagesProvides caching for faster access to frequently used images.
0
CCC.CntrReg.F08Multi-platform SupportAbility to store images built for different CPU architectures such as x86_64 (AMD/Intel), ARM64, and others within the same container image repository.
0
CCC.CntrReg.F09Immutable TagsPrevent tags from being overwritten or deleted once they have been assigned to an image. This ensures that once a container image is tagged with a specific version or identifier, that tag remains associated with the same image throughout its lifetime.
0
CCC.CntrReg.F10List RepositoriesAbility to list all public and private repositories in the container image registry.
0
CCC.CntrReg.F11Edit RepositoryAbility to edit a public or private container image repository properties after being created.
0
CCC.CntrReg.F12Delete RepositoryAbility to delete a public or private container image repository after being created.
0
CCC.CntrReg.F13List ImagesAbility to list container images in a public or private container image repository.
0
CCC.CntrReg.F14Delete ImageAbility to delete a container image after being created.
0
CCC.CntrReg.F15List Lifecycle PoliciesAbility to list lifecycle policies for container images in a public or private container repository.
0
CCC.CntrReg.F16Edit Lifecycle PolicyAbility to edit a lifecycle policy after being created.
0
CCC.CntrReg.F17Delete Lifecycle PolicyAbility to delete a lifecycle policy after being created.
0
CCC.Core.F01Encryption in Transit Enabled by DefaultThe service automatically encrypts all data using industry-standard cryptographic protocols prior to transmission via a network interface.
0
CCC.Core.F02Encryption at Rest Enabled by DefaultThe service automatically encrypts all data using industry-standard cryptographic protocols prior to being written to a storage medium.
0
CCC.Core.F03Access Log PublicationThe service automatically publishes structured, verbose records of activities performed within the scope of the service by external actors.
2
CCC.Core.F04Transaction Rate LimitsThe service can throttle, delay, or reject excess requests when transactions exceed a user-specified rate limit, and always provides industry-standard throughput up to that limit.
1
CCC.Core.F05Signed URLsThe service can generate an ad hoc URL containing authentication information to enforce user-configured permissions for accessing a specific component or a child resource.
0
CCC.Core.F06Access ControlThe service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes.
1
CCC.Core.F07Event PublicationThe service automatically publishes a structured state-change record upon creation, deletion, or modification of data, configuration, components, or child resources.
1
CCC.Core.F09Metrics PublicationThe service automatically publishes structured, numeric, time-series data points related to the performance, availability, and health of the service or its child resources.
2
CCC.Core.F14API AccessThe service exposes a port enabling external actors to interact programmatically with the service and its resources using HTTP protocol methods such as GET, POST, PUT, and DELETE.
1
CCC.Core.F18Resource VersioningThe service automatically assigns versions to child resources which can be used to preserve, retrieve, and restore past iterations.
3
CCC.Core.F22Location Lock-InThe service may be configured to restrict the deployment of child resources to specific geographic locations.
1

Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.CntrReg.TH01Vulnerabilities in Artifacts are ExploitedAttackers exploit known vulnerabilities in container images or artifacts stored in the registry, leading to unauthorized access, data breaches, or system compromise.
1
1
1
CCC.CntrReg.TH02Accumulation of Unused ArtifactsThe registry accumulates outdated or unused artifacts, increasing storage costs and the risk of deploying vulnerable or untested versions.
1
1
0
CCC.Core.TH01Access is Granted to Unauthorized UsersLogic designed to give different permissions to different entities may be misconfigured or manipulated, allowing unauthorized entities to access restricted parts of the service, its data, or its child resources. This could result in a loss of data confidentiality or tolerance of unauthorized actions which impact the integrity and availability of resources and data.
1
1
3
CCC.Core.TH02Data is Intercepted in TransitData transmitted by the service is susceptible to collection by any entity with access to any part of the transmission path. Packet observations can be used to support the planning of attacks by profiling origin points, destinations, and usage patterns. The data may also be vulnerable to interception or modification in transit if not properly encrypted, impacting the confidentiality or integrity of the transmitted data.
1
1
1
CCC.Core.TH03Deployment Region Network is UntrustedSystems are susceptible to unauthorized access or interception by actors with social or physical control over the network in which they are deployed. If the geopolitical status of the deployment network is untrusted, unstable, or insecure, this could result in a loss of confidentiality, integrity, or availability of the service and its data.
1
1
1
CCC.Core.TH04Data is Replicated to Untrusted or External LocationsSystems are susceptible to unauthorized access or interception by actors with political or physical control over the network in which they are deployed. Confidentiality may be impacted if the data is replicated to a network where the geopolitical status is untrusted, unstable, or insecure.
1
1
2
CCC.Core.TH05Interference with Replication ProcessesMisconfigured or manipulated replication processes may lead to data being copied to unintended locations, delayed, modified, or not being copied at all. This could lead to compromised data confidentiality and integrity, potentially also affecting recovery processes and data availability.
1
1
0
CCC.Core.TH06Data is Lost or CorruptedServices that rely on accurate data are susceptible to disruption in the event of data loss or corruption. Any actions that lead to the unintended deletion, alteration, or limited access to data can impact the availability of the service and the system it is part of.
1
1
0
CCC.Core.TH07Logs are Tampered With or DeletedTampering or deletion of service logs will reduce the system's ability to maintain an accurate record of events. Any actions that compromise the integrity of logs could disrupt system availability by disrupting monitoring, hindering forensic investigations, and reducing the accuracy of audit trails.
1
1
1
CCC.Core.TH09Runtime Logs are Read by Unauthorized EntitiesUnauthorized access to logs may expose valuable information about the system's configuration, operations, and security mechanisms. This could jeopardize system availability through the exposure of vulnerabilities and support the planning of attacks on the service, system, or network. If logs are not adequately sanitized, this may also directly impact the confidentiality of sensitive data.
1
1
1
CCC.Core.TH11Publications are Incorrectly TriggeredIncorrectly triggered publications may disseminate inaccurate or misleading information, creating a data integrity risk. Such misinformation can cause unintended operations to be initiated, conceal legitimate issues, and disrupt the availability or reliability of systems and their data.
1
1
0
CCC.Core.TH12Resource Constraints are ExhaustedExceeding the resource constraints through excessive consumption, resource-intensive operations, or lowering of rate-limit thresholds can impact the availability of elements such as memory, CPU, or storage. This may disrupt availability of the service or child resources by denying the associated functionality to users. If the impacted system is not designed to expect such a failure, the effect could also cascade to other services and resources.
1
1
0
CCC.Core.TH14Older Resource Versions are UsedRunning older versions of child resources can expose the system to known vulnerabilities that have been addressed in more recent versions. If the version identifier is detected by an attacker, it may be possible to exploit these vulnerabilities to compromise the confidentiality, integrity, or availability of the system and its data.
1
1
1
CCC.Core.TH15Automated Enumeration and Reconnaissance by Non-human EntitiesAutomated processes may be used to gather details about service and child resource elements such as APIs, file systems, or directories. This information can reveal vulnerabilities, misconfigurations, and the network topology, which can be used to plan an attack against the system, the service, or its child resources.
1
1
0
CCC.Core.TH16Publications are DisabledPublication of events, metrics, and runtime logs may be disabled, leading to a lack of expected security and operational information being shared. This can impact system availability by delaying the detection of incidents while also impacting system design decisions and enforcement of operational thresholds, such as autoscaling or cost management.
1
1
0

Controls

IDTitleObjectiveControl FamilyThreat MappingsGuideline MappingsAssessment Requirements
CCC.CntrReg.C01Implement Vulnerability Scanning for ArtifactsEnsure that container images and artifacts stored in the container registry are scanned for vulnerabilities to identify and remediate security issues before deployment. Risk Management
1
3
1
CCC.CntrReg.C02Implement Cleanup Policies for ArtifactsEnsure that unused or outdated artifacts are cleaned up according to defined policies to manage storage effectively and reduce security risks associated with outdated versions. Data Management
1
2
1
CCC.Core.C01Encrypt Data for TransmissionEnsure that all communications are encrypted in transit to protect data integrity and confidentiality. Data
1
8
5
CCC.Core.C02Encrypt Data for StorageEnsure that all data stored is encrypted at rest using strong encryption algorithms. Data
1
7
1
CCC.Core.C06Restrict Deployments to Trust PerimeterEnsure that the service and its child resources are only deployed on infrastructure in locations that are explicitly included within a defined trust perimeter. Data
1
4
2
CCC.Core.C09Ensure Integrity of Access LogsEnsure that access logs are always recorded to an external location that cannot be manipulated from the context of the service(s) it contains logs for. Data
3
5
3
CCC.Core.C10Restrict Data Replication to Trust PerimeterEnsure that data is only replicated on infrastructure in locations that are explicitly included within a defined trust perimeter. Data
1
4
1
CCC.Core.C04Log All Access and ChangesEnsure that all access attempts are logged to maintain a detailed audit trail for security and compliance purposes. Logging & Monitoring
1
5
3
CCC.Core.C05Prevent Access from Untrusted EntitiesEnsure that secure access controls enforce the principle of least privilege to restrict access to authorized entities from explicitly trusted sources only. Identity and Access Management
1
8
6