STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← RA-5 (5) — Vulnerability Monitoring and Scanning

CCI-001067

Definition

Implement privileged access authorization to organization-identified system components for organization-defined vulnerability scanning activities.

Parent Control

RA-5 (5)Vulnerability Monitoring and ScanningRisk Assessment

Linked STIG Checks (9)

V-276015CAT IIAx-OS must implement privileged access authorization to all information systems and infrastructure components for selected organization-defined vulnerability scanning activities.Axonius Federal Systems Ax-OS Security Technical Implementation GuideV-233210CAT IIVulnerability scanning applications must implement privileged access authorization to all container platform components, containers, and container images for selected organization-defined vulnerability scanning activities.Container Platform Security Requirements GuideV-235840CAT IIVulnerability scanning must be enabled for all repositories in the Docker Trusted Registry (DTR) component of Docker Enterprise.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-205582CAT IIThe Mainframe Product must implement privileged access authorization to all information systems and infrastructure components for selected vulnerability scanning activities as defined in the site security plan.Mainframe Product Security Requirements GuideV-260943CAT IIVulnerability scanning must be enabled for all repositories in MSR.Mirantis Kubernetes Engine Security Technical Implementation GuideV-253546CAT IIPrisma Cloud Compute Defender containers must run as root.Palo Alto Networks Prisma Cloud Compute Security Technical Implementation GuideV-257563CAT IIVulnerability scanning applications must implement privileged access authorization to all OpenShift components, containers, and container images for selected organization-defined vulnerability scanning activities.Red Hat OpenShift Container Platform 4.12 Security Technical Implementation GuideV-257563CAT IIVulnerability scanning applications must implement privileged access authorization to all OpenShift components, containers, and container images for selected organization-defined vulnerability scanning activities.Red Hat OpenShift Container Platform 4.x Security Technical Implementation GuideV-234034CAT IIThe vulnerability scanning application must implement privileged access authorization to all Tanium information systems and infrastructure components for selected organization-defined vulnerability scanning activities.Tanium 7.3 Security Technical Implementation Guide