UCF STIG Viewer Logo

Vulnerability scanning applications must implement privileged access authorization to all container platform components, containers, and container images for selected organization-defined vulnerability scanning activities.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233210 SRG-APP-000414-CTR-001010 SV-233210r601119_rule Medium
Description
In certain situations, the nature of the vulnerability scanning may be more intrusive, or the container platform component that is the subject of the scanning may contain highly sensitive information. Privileged access authorization to selected system components facilitates more thorough vulnerability scanning and protects the sensitive nature of such scanning. The vulnerability scanning application must utilize privileged access authorization for the scanning account.
STIG Date
Container Platform Security Requirements Guide 2021-12-14

Details

Check Text ( C-36146r601117_chk )
Validate that scanning applications have privileged access to container platform components, containers, and container images to properly perform vulnerability scans.

If privileged access is not given to the scanning application, this is a finding.
Fix Text (F-36114r601118_fix)
Configure the vulnerability scanning application to have privileged access to the container platform components, containers, and container images.