STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233027

CAT II (Medium)

Least privilege access and need-to-know must be required to access the container platform runtime.

Rule ID

SV-233027r1137639_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-000213

Discussion

The container platform runtime is used to instantiate containers. If this process is accessed by those persons who are not authorized, those containers offering services can be brought to a denial-of-service (DoS) situation, disabling a large number of services with a small change to the container platform. To limit this threat, it is important to limit access to the runtime to only those individuals with runtime duties. This requirement also applies to Zero Trust initiatives.

Check Content

Review the container platform to determine if only those individuals with runtime duties have access to the container platform runtime. 

If users have access to the container platform runtime that do not have runtime duties, this is a finding.

Fix Text

Configure the container platform to use least privilege and need-to-know when granting access to the container runtime. This fix ensures the proper roles and permissions are configured.