Skip to main content
CUI

STIG Rule - V-233122

V-233122

SV-233122r961122_rule

CAT II

The container platform runtime must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

From: Container Platform Security Requirements Guide (V2R4)

Description

<VulnDiscussion>The container platform offers services for container image orchestration and services for users. If any of these services were to fail into an insecure state, security measures for user and data separation and image instantiation could become absent. In addition, audit log protections could be relaxed allowing for investigation of what occurred could be lost. To protect services and data, it is important for the container platform to fail to a secure state if the container platform registry initialization fails, shutdown fails, or aborts fail.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

Review documentation and configuration to determine if the container platform runtime fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If the container platform runtime cannot be configured to fail securely, this is a finding.

Fix Text

Configure the container platform runtime to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

CCI Reference

CCI-001190
Created
2026-04-07 20:08:14
Last Updated
2026-04-07 20:08:14
CUI