The container platform must continuously scan components, containers, and images for vulnerabilities.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-233275SRG-APP-000516SRG-APP-000516-CTR-001335SV-233275r961863_rule2024-12-052
Description
Finding vulnerabilities quickly within the container platform and within containers deployed within the platform is important to keep the overall platform secure. When a vulnerability within a component or container is unknown or allowed to remain unpatched, other containers and customers within the platform become vulnerability. The vulnerability can lead to the loss of application data, organizational infrastructure data, and denial of service (DoS) to hosted applications. Vulnerability scanning can be performed by the container platform or by external applications.
ℹ️ Check
Review the container platform to validate continuous vulnerability scans of components, containers, and container images are being performed. If continuous vulnerability scans are not being performed, this is a finding.
✔️ Fix
Implement continuous vulnerability scans of container platform components, containers, and container images either by the container platform or from external vulnerability scanning applications.