STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Container Platform Security Requirements Guide

V-233078

CAT II (Medium)

The container platform application program interface (API) must uniquely identify and authenticate processes acting on behalf of the users.

Rule ID

SV-233078r1051115_rule

STIG

Container Platform Security Requirements Guide

Version

V2R4

CCIs

CCI-000764

Discussion

The container platform API can be used to perform any task within the platform. Often, the API is used to create tasks that perform some kind of maintenance task and run without user interaction. To guarantee the task is authorized, it is important to authenticate the task. These tasks, even though executed without user intervention, run on behalf of a user and must run with the user's authorization. If tasks are allowed to be created without authentication, users could bypass authentication and authorization mechanisms put in place for user interfaces. This could lead to users gaining greater access than given to the user putting the container platform into a compromised state.

Check Content

Review the container platform API configuration to determine if processes acting on behalf of users are uniquely identified and authenticated. 

If processes acting on behalf of users are not uniquely identified or are not authenticated, this is a finding.

Fix Text

Configure the container platform API to uniquely identify and authenticate processes acting on behalf of users.