5.3.9 Ensure multifactor authentication for access to privileged accounts

Information

The operating system must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).

Rationale:

Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the information system is compromised, that compromise will not affect credentials stored on the authentication device.

Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD Common Access Card.

A privileged account is defined as an information system account with authorizations of a privileged user.

Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless.

This requirement only applies to components where this is specific to the function of the device or has the concept of an organizational user (e.g., VPN, proxy capability). This does not apply to authentication for the purpose of configuring the device itself (management).

Solution

Configure the operating system to implement multifactor authentication for remote access to privileged accounts via PAM.
Modify all of the services lines in /etc/sssd/sssd.conf or in configuration files found under /etc/sssd/conf.d to include pam.
Example: vim /etc/sssd/sssd.conf
Add pam to the service line as shown here:

services = nss, pam

Notes:

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019



Vul ID: V-72427

Rule ID: SV-87051r4_rule

STIG ID: RHEL-07-041002

Severity: CAT II

See Also

https://workbench.cisecurity.org/files/2688

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(1)

Plugin: Unix

Control ID: a64d9f720792fa690440cb0bd18bf4b6f4553f0a7b0743b10c4c312fcf73fb1a