Skip to main content
CUI

STIG Rule - V-233264

V-233264

SV-233264r961827_rule

CAT II

The container platform must generate audit record for privileged activities.

From: Container Platform Security Requirements Guide (V2R4)

Description

<VulnDiscussion>The container platform components will generate audit records for privilege activities and container platform runtime, registry, and keystore must generate access audit records to detect possible malicious intent. All the components must use the same standard so that the events can be tied together to understand what took place within the overall container platform. It would be difficult to establish, correlate, and investigate events relating to an incident or identify those responsible without these activities. Audit records can be generated from various components within the container platform.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

Review the documentation and configuration guides to determine if the container platform generates log records for privileged activities. If log records are not generated for privileged activities, this is a finding.

Fix Text

Configure the container platform to generate log records for privileged activities.

CCI Reference

CCI-000172
Created
2026-04-07 20:08:14
Last Updated
2026-04-07 20:08:14
CUI