UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Vulnerability scanning applications must implement privileged access authorization to all container platform components, containers, and container images for selected organization-defined vulnerability scanning activities.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233210 SRG-APP-000414-CTR-001010 SV-233210r879787_rule Medium
Description
In certain situations, the nature of the vulnerability scanning may be more intrusive, or the container platform component that is the subject of the scanning may contain highly sensitive information. Privileged access authorization to selected system components facilitates more thorough vulnerability scanning and protects the sensitive nature of such scanning. The vulnerability scanning application must utilize privileged access authorization for the scanning account.
STIG Date
Container Platform Security Requirements Guide 2023-06-05

Details

Check Text ( C-36146r601117_chk )
Validate that scanning applications have privileged access to container platform components, containers, and container images to properly perform vulnerability scans.

If privileged access is not given to the scanning application, this is a finding.
Fix Text (F-36114r601118_fix)
Configure the vulnerability scanning application to have privileged access to the container platform components, containers, and container images.