STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233164

CAT II (Medium)

The container platform must audit the execution of privileged functions.

Rule ID

SV-233164r961362_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-002234

Discussion

Privileged functions within the container platform can be component specific or can envelope the entire container platform. Because of the nature of the commands, it is important to understand what command was executed for either investigation of an incident or for debugging/error correction; therefore, privileged function execution must be audited.

Check Content

Review container platform documentation and log configuration to verify the application server logs privileged activity. 

If the container platform is not configured to log privileged activity, this is a finding.

Fix Text

Configure the container platform to log privileged activity.