STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233055

CAT II (Medium)

The container platform must use internal system clocks to generate audit record time stamps.

Rule ID

SV-233055r960927_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-000159

Discussion

Understanding when and sequence of events for an incident is crucial to understand what may have taken place. Without a common clock, the components generating audit events could be out of synchronization and would then present a picture of the event that is warped and corrupted. To give a clear picture, it is important that the container platform and its components use a common internal clock.

Check Content

Review the container platform configuration files to determine if the internal system clock is used for time stamps. 

If the container platform does not use the internal system clock to generate time stamps, this is a finding.

Fix Text

Configure the container platform to use internal system clocks to generate time stamps for log records.