The present technology addresses a need in the art for an automated and scalable mechanism to authorize a containerized process. An aspect of the present technology deals with authorizing an unprivileged process by a privileged process without embedding credentials or network access at the time of validation. The present technology provides the possibility for the privileged process to continuously (dynamically) validate the authenticity of the unprivileged process by performing a plurality of operations to ensure the unprivileged process has maintained its authenticity while having access to sensitive information.