STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Container Platform Security Requirements Guide

V-270875

CAT II (Medium)

The container must have resource request limits set.

Rule ID

SV-270875r1050646_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-001095

Discussion

Setting a container resource request limit allows the container platform to determine the best location for the container to execute. The container platform looks at the resources available and finds the location that will require the minimum resources for the container to execute. Examples of resources that can be specified are CPU, memory, and storage.

Check Content

Review the container platform configuration to determine that resource limits are set.

If the container platform does not enforce resource limits, this is a finding.

Fix Text

Configure the container platform to restrict the ability of users or other systems to launch denial-of-service (DoS) attacks from the container platform components by setting resource limits on resources such as memory, storage, and CPU utilization.