Skip to main content
CUI

STIG Rule - V-233164

V-233164

SV-233164r961362_rule

CAT II

The container platform must audit the execution of privileged functions.

From: Container Platform Security Requirements Guide (V2R4)

Description

<VulnDiscussion>Privileged functions within the container platform can be component specific or can envelope the entire container platform. Because of the nature of the commands, it is important to understand what command was executed for either investigation of an incident or for debugging/error correction; therefore, privileged function execution must be audited.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

Review container platform documentation and log configuration to verify the application server logs privileged activity. If the container platform is not configured to log privileged activity, this is a finding.

Fix Text

Configure the container platform to log privileged activity.

CCI Reference

CCI-002234
Created
2026-04-07 20:08:14
Last Updated
2026-04-07 20:08:14
CUI