STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233080

CAT II (Medium)

The container platform must use multifactor authentication for network access to non-privileged accounts.

Rule ID

SV-233080r960975_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-000766

Discussion

To ensure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor authentication uses two or more factors to achieve authentication. Factors include: (i) Something you know (e.g., password/PIN); (ii) Something you have (e.g., cryptographic identification device, token); or (iii) Something you are (e.g., biometric). A non-privileged account is any information system account with authorizations of a non-privileged user. Network access is any access to an application by a user (or process acting on behalf of a user) where said access is obtained through a network connection. Applications integrating with the DoD Active Directory and utilize the DoD CAC are examples of compliant multifactor authentication solutions.

Check Content

Review the container platform configuration to determine if the container platform is configured to use multifactor authentication for network access to non-privileged accounts. 

If the container platform does not use multifactor authentication for network access to non-privileged accounts, this is a finding.

Fix Text

Configure the container platform to use multifactor authentication for network access to non-privileged accounts.