STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233026

CAT II (Medium)

Least privilege access and need-to-know must be required to access the container platform registry.

Rule ID

SV-233026r1137638_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-000213

Discussion

The container platform registry is used to store images and is the keeper of truth for trusted images within the platform. To guarantee the images integrity, access to the registry must be limited to those individuals who need to perform tasks to the images such as the update, creation, or deletion of images. Without this control access, images can be deleted that are in use by the container platform causing a denial of service (DoS), and images can be modified or introduced without going through the testing and validation process allowing for the intentional or unintentional introduction of containers with flaws and vulnerabilities. This requirement also applies to Zero Trust initiatives.

Check Content

Review the container platform configuration to determine if least privilege and need-to-know access is being used for container platform registry access. 

If least privilege and need-to-know access is not being used for container platform registry access, this is a finding.

Fix Text

Configure the container platform to use least privilege and need-to-know when granting access to the container platform registry. This fix ensures the proper roles and permissions are configured.