WN08-MO-000001 - The VPN client on mobile devices must use DoD approved multi-factor authentication tokens (e.g., Common Access Card (CAC) for unclassified systems) when connecting to DoD networks.

Information

VPNs are vulnerable to attack if they are not supported by strong authentication. An adversary may be able gain access to network resources and sensitive information if they can compromise the authentication process. DoD approved multi-factor authentication tokens (e.g., Common Access Card (CAC) for unclassified systems) is strong cryptographic two-factor authentication that greatly mitigates the risk of VPN authentication breaches.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the VPN client on mobile devices to use DoD approved multi-factor authentication tokens (e.g., Common Access Card (CAC) for unclassified systems) when connecting to DoD networks.

Procedures will vary depending on the VPN client used.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_8_and_8-1_V1R23_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001967, Rule-ID|SV-48425r2_rule, STIG-ID|WN08-MO-000001, Vuln-ID|V-36752

Plugin: Windows

Control ID: 3f352eb5a7780ddddaf45a01116ee5a42a9a937af6a2d8acc2a4a58c1f936b62