STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233030

CAT II (Medium)

The container platform must enforce approved authorizations for controlling the flow of information between interconnected systems and services based on organization-defined information flow control policies.

Rule ID

SV-233030r1137642_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-001414

Discussion

Controlling information flow between the container platform components and container user services instantiated by the container platform must enforce organization-defined information flow policies. Example methods for information flow control are: using labels for containers to segregate services; user permissions and roles to limit what user services are available to each user; controlling the user the services are able to execute as; and limiting inter-container network traffic and the resources containers can consume. This requirement also applies to Zero Trust initiatives.

Check Content

Review the container platform configuration to determine if organization-defined information flow controls are implemented. 

If information flow controls are not implemented, this is a finding.

Fix Text

Configure the container platform to implement organization-defined information flow controls.