UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The organization-defined role must verify correct operation of security functions in the container platform.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233242 SRG-APP-000472-CTR-001170 SV-233242r599675_rule Medium
Description
Without verification, security functions may not operate correctly and this failure may go unnoticed within the container platform. The container platform components must identity and ensure the security functions are still operational and applicable to the organization. Security functions are responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based. Security functionality includes, but is not limited to, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Notifications provided by information systems include, for example, electronic alerts to system administrators.
STIG Date
Container Platform Security Requirements Guide 2020-11-24

Details

Check Text ( C-36178r599674_chk )
Review container platform documentation and configuration verification of the correct operation of security functions, which may include the valid connection to an external security manager (ESM).

If verification of the correct operation of security functions is not performed, this is a finding.
Fix Text (F-36146r599363_fix)
Configure the container platform configuration and installation settings to perform verification of the correct operation of security functions.