STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233263

CAT II (Medium)

The container platform must generate audit records when successful/unsuccessful logon attempts occur.

Rule ID

SV-233263r961824_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-000172

Discussion

The container platform and its components must generate audit records when successful and unsuccessful logon attempts occur. The information system can determine if an account is compromised or is in the process of being compromised and can take actions to thwart the attack. All the components must use the same standard so that the events can be tied together to understand what took place within the overall container platform. This must establish, correlate, and help assist with investigating the events relating to an incident, or identify those responsible.

Check Content

Review the container platform configuration for audit logon events. 

Ensure audit policy for successful and unsuccessful logon events are enabled. 

Verify events are written to the log. 

Validate system documentation is current. 

If logon attempts do not generate log records, this is a finding.

Fix Text

Configure the container platform registry, keystore, and runtime to generate audit log for successful and unsuccessful logon for any all accounts and services. Revise all applicable system documentation.