STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233047

CAT II (Medium)

All audit records must identify any users associated with the event within the container platform.

Rule ID

SV-233047r960906_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-001487

Discussion

Without information that establishes the identity of the user associated with the events, security personnel cannot determine responsibility for the potentially harmful event.

Check Content

Review container platform documentation and the log files on the application server to determine if the logs contain information that establishes the identity of the user or process associated with log event data. 

If the container platform does not produce logs that establish the identity of the user or process associated with log event data, this is a finding.

Fix Text

Configure the container platform logging system to log the identity of the user or process related to the events.