Rule ID
SV-274723r1143761_rule
Version
V1R1
CCIs
CCI-003747
Authentication safeguards for remote commands help to ensure that information systems accept and execute, in the order intended, only authorized commands and reject unauthorized commands. Cryptographic mechanisms can be employed, for example, to authenticate remote commands. Safeguards include, at a minimum, FIPS-compliant cryptographic hash. Standard API authentication protocols provide this protection (e.g., Oauth 2.0, JWT).
Verify the API authenticates remote commands. If the API does not authenticate remote commands, this is a finding.
Build or configure the API to authenticate remote commands.