STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233210

CAT II (Medium)

Vulnerability scanning applications must implement privileged access authorization to all container platform components, containers, and container images for selected organization-defined vulnerability scanning activities.

Rule ID

SV-233210r961563_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-001067

Discussion

In certain situations, the nature of the vulnerability scanning may be more intrusive, or the container platform component that is the subject of the scanning may contain highly sensitive information. Privileged access authorization to selected system components facilitates more thorough vulnerability scanning and protects the sensitive nature of such scanning. The vulnerability scanning application must utilize privileged access authorization for the scanning account.

Check Content

Validate that scanning applications have privileged access to container platform components, containers, and container images to properly perform vulnerability scans. 

If privileged access is not given to the scanning application, this is a finding.

Fix Text

Configure the vulnerability scanning application to have privileged access to the container platform components, containers, and container images.