UCF STIG Viewer Logo

The container platform application program interface (API) must uniquely identify and authenticate processes acting on behalf of the users.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233078 SRG-APP-000148-CTR-000350 SV-233078r601709_rule Medium
Description
The container platform API can be used to perform any task within the platform. Often, the API is used to create tasks that perform some kind of maintenance task and run without user interaction. To guarantee the task is authorized, it is important to authenticate the task. These tasks, even though executed without user intervention, run on behalf of a user and must run with the user's authorization. If tasks are allowed to be created without authentication, users could bypass authentication and authorization mechanisms put in place for user interfaces. This could lead to users gaining greater access than given to the user putting the container platform into a compromised state.
STIG Date
Container Platform Security Requirements Guide 2021-12-14

Details

Check Text ( C-36014r601708_chk )
Review the container platform API configuration to determine if processes acting on behalf of users are uniquely identified and authenticated.

If processes acting on behalf of users are not uniquely identified or are not authenticated, this is a finding.
Fix Text (F-35982r600722_fix)
Configure the container platform API to uniquely identify and authenticate processes acting on behalf of users.