UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Configuration files for the container platform must be protected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233069 SRG-APP-000133-CTR-000305 SV-233069r960960_rule Medium
Description
The secure configuration of the container platform must be protected by disallowing changes to be implemented by non-privileged users. Changes to the container platform can introduce security risks or stability issues and undermine change management procedures. Securing configuration files from non-privileged user modification can be enforced using file ownership and permissions.
STIG Date
Container Platform Security Requirements Guide 2024-05-28

Details

Check Text ( C-36005r600694_chk )
Review the container platform to verify that configuration files cannot be modified by non-privileged users.

If non-privileged users can modify configuration files, this is a finding.
Fix Text (F-35973r600695_fix)
Configure the container platform to only allow configuration modifications by privileged users.