UCF STIG Viewer Logo

The container platform must require devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233194 SRG-APP-000390-CTR-000930 SV-233194r601800_rule Medium
Description
The container platform may require external devices be used to fully orchestrate the services needed for users. Examples would be storage or external servers. Without reauthentication, unidentified or unknown devices may be introduced; thereby facilitating malicious activity. The container platform must be capable of allowing the organization to set requirements associated with device reauthentication. Examples are: Organizations may require reauthentication of devices, including (but not limited to), the following other situations: (i) When authenticators change; (ii) When roles change; (iii) When security categories of information systems change; (iv) After a fixed period of time; or (v) Periodically. For distributed architectures (e.g., service-oriented architectures), the decisions regarding the validation of identification claims may be made by services separate from the services acting on those decisions. In such situations, it is necessary to provide the identification decisions (as opposed to the actual identifiers) to the services that need to act on those decisions.
STIG Date
Container Platform Security Requirements Guide 2021-12-14

Details

Check Text ( C-36130r601799_chk )
Review documentation and configuration to determine if the container platform requires devices to reauthenticate when organization-defined circumstances or situations require reauthentication.

If the container platform does not require a device to reauthenticate, this is a finding.
Fix Text (F-36098r601070_fix)
Configure the container platform to require devices to reauthenticate when organization-defined circumstances or situations require reauthentication.