STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233190

CAT II (Medium)

All non-essential, unnecessary, and unsecure DoD ports, protocols, and services must be disabled in the container platform.

Rule ID

SV-233190r961470_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-001762

Discussion

To properly offer services to the user and to orchestrate containers, the container platform may offer services that use ports and protocols that best fit those services. The container platform, when offering the services, must only offer the services on ports and protocols authorized by the DoD. To validate that the services are using only the approved ports and protocols, the organization must perform a periodic scan/review of the container platform and disable functions, ports, protocols, and services deemed to be unneeded or non-secure.

Check Content

Review the container platform configuration to determine if services or capabilities presently on the information system are required for operational or mission needs. 

If additional services or capabilities are present on the system, this is a finding.

Fix Text

Configure the container platform to only utilize secure ports and protocols required for operation that have been accepted for use as per the Ports, Protocols, and Services Category Assignments List (CAL) from DISA (PPSM).