STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233242

CAT II (Medium)

The organization-defined role must verify correct operation of security functions in the container platform.

Rule ID

SV-233242r961731_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-002696

Discussion

Without verification, security functions may not operate correctly and this failure may go unnoticed within the container platform. The container platform components must identity and ensure the security functions are still operational and applicable to the organization. Security functions are responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based. Security functionality includes, but is not limited to, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Notifications provided by information systems include, for example, electronic alerts to system administrators.

Check Content

Review container platform documentation and configuration verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM). 

If verification of the correct operation of security functions is not performed, this is a finding.

Fix Text

Configure the container platform configuration and installation settings to perform verification of the correct operation of security functions.