STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233264

CAT II (Medium)

The container platform must generate audit record for privileged activities.

Rule ID

SV-233264r961827_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-000172

Discussion

The container platform components will generate audit records for privilege activities and container platform runtime, registry, and keystore must generate access audit records to detect possible malicious intent. All the components must use the same standard so that the events can be tied together to understand what took place within the overall container platform. It would be difficult to establish, correlate, and investigate events relating to an incident or identify those responsible without these activities. Audit records can be generated from various components within the container platform.

Check Content

Review the documentation and configuration guides to determine if the container platform generates log records for privileged activities. 

If log records are not generated for privileged activities, this is a finding.

Fix Text

Configure the container platform to generate log records for privileged activities.