Introduction
Poolside’s on-premises platform is designed to operate in high-security environments, including those requiring Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) compliance. Use these guidelines when you deploy Poolside on STIG-hardened Red Hat Enterprise Linux (RHEL) or Ubuntu systems. This page outlines key considerations, known compatibility issues, and recommended configurations for high-security environments that require DISA STIG compliance. These recommendations draw from the DISA STIG library and related STIG references. Poolside does not provide STIG-specific implementation guidance or support for customer-defined STIG policies.Supported operating systems and STIG baselines
The following table lists the operating systems Poolside supports for on-premises deployments, along with the STIG baselines Poolside has validated and any baselines still under evaluation.| OS | Version | STIG baseline | Status |
|---|---|---|---|
| Ubuntu | 22.04 LTS | DISA STIG Ubuntu 22.04 v2r7 | Supported with documented exceptions |
| Red Hat Enterprise Linux (RHEL) | 9.x | DISA STIG RHEL 9 v2r5 | Supported with documented exceptions |
| Ubuntu | 24.04 | DISA STIG Ubuntu 24.04 v1r4 | Currently being evaluated |
Recommended approach
Apply STIG hardening after you complete the on-premises installation. This sequence gives you a clean baseline and simplifies troubleshooting if issues arise. For Ubuntu and RHEL environments, use the OpenSCAP tooling with the DISA STIG profile. For example, on RHEL 9.x:Known compatibility considerations
Poolside’s Kubernetes-based architecture relies on the NVIDIA GPU Operator and container runtime components that interact with kernel-level features. Certain STIG controls can conflict with these requirements.Berkeley Packet Filter (BPF) controls
Two specific STIG controls affect how the NVIDIA container runtime manages GPU device access:| STIG ID | Control | Default STIG value | Poolside requirement |
|---|---|---|---|
| V-257810 | kernel.unprivileged_bpf_disabled | 1 (enabled) | 0 (disabled) |
| V-257942 | net.core.bpf_jit_harden | 1 or 2 (enabled) | 0 (disabled) |
0 in /etc/sysctl.conf:
Additional considerations
When applying STIG hardening to Poolside deployments, consider the following:| Control area | Consideration |
|---|---|
| Federal Information Processing Standards (FIPS)-validated cryptography | Configure this during OS installation. Contact Poolside if you deploy in a FIPS-required environment. |
| Repeated privilege escalation authentication | Terraform-based installation requires a temporary sudoers configuration during deployment. |
| Uncomplicated Firewall (UFW) rate limiting | Default rate limits are compatible. High-concurrency deployments may require tuned thresholds. |
| Sticky bit on public directories | Compatible with Poolside’s single-tenant architecture |
Pre-deployment checklist
Before deploying Poolside on a STIG-hardened system:- Document your STIG baseline: Provide Poolside with the specific STIG profile version and any customer-specific policy modifications.
- Apply OS hardening last: Complete STIG remediation after Poolside installation.
- Configure BPF exceptions: Apply the kernel parameter changes documented in the Berkeley Packet Filter (BPF) controls section. Reboot the system for the changes to take effect.
- Validate GPU access: Confirm all pods in
gpu-operatorareRunningorCompletedafter hardening. - Retain scan reports: Keep pre-remediation and post-remediation OpenSCAP reports for troubleshooting.