STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233064

CAT II (Medium)

The container platform must be built from verified packages.

Rule ID

SV-233064r981843_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-003992

Discussion

It is important to patch and upgrade the container platform when patches and upgrades are available. More important is to get these patches and upgrades from a known source. To validate the authenticity of any patches and upgrades before installation, the container platform must check that the files are digitally signed by sources approved by the organization.

Check Content

Review the container platform configuration to verify it has been built from packages that are digitally signed by known and approved sources. 

If the container platform was built from packages that are not digitally signed or are from unknown or nonapproved sources, this is a finding.

Fix Text

Rebuild the container platform from verified packages that are digitally signed by known and approved sources.