STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233066

CAT II (Medium)

The container platform must limit privileges to the container platform registry.

Rule ID

SV-233066r960960_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-001499

Discussion

To control what is instantiated within the container platform, it is important to control access to the registry. Without this control, container images can be introduced and instantiated by accident or on container platform startup. Without control of the registry, security measures put in place for the runtime can be bypassed meaning the controls of approval and testing are also bypassed. Only those individuals and roles approved by the organization can have access to the container platform registry.

Check Content

Review the container platform registry configuration to determine if the level of access to the registry is controlled through user privileges. 

Attempt to perform registry operations to determine if the privileges are enforced. 

If the container platform registry is not limited through user privileges or the user privileges are not enforced, this is a finding.

Fix Text

Configure the container platform to use and enforce user privileges when accessing the container platform registry.