STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Container Platform Security Requirements Guide

V-233030

CAT II (Medium)

The container platform must enforce approved authorizations for controlling the flow of information between interconnected systems and services based on organization-defined information flow control policies.

Rule ID

SV-233030r1137642_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-001414

Discussion

Controlling information flow between the container platform components and container user services instantiated by the container platform must enforce organization-defined information flow policies. Example methods for information flow control are: using labels for containers to segregate services; user permissions and roles to limit what user services are available to each user; controlling the user the services are able to execute as; and limiting inter-container network traffic and the resources containers can consume. This requirement also applies to Zero Trust initiatives.

Check Content

Review the container platform configuration to determine if organization-defined information flow controls are implemented. 

If information flow controls are not implemented, this is a finding.

Fix Text

Configure the container platform to implement organization-defined information flow controls.