800-53|IA-2(1)

Title

NETWORK ACCESS TO PRIVILEGED ACCOUNTS

Description

The information system implements multifactor authentication for network access to privileged accounts.

Reference Item Details

Related: AC-6

Category: IDENTIFICATION AND AUTHENTICATION

Parent Title: IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)

Family: IDENTIFICATION AND AUTHENTICATION

Baseline Impact: LOW,MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.1.3.8.1 Set 'Microsoft network server: Disconnect clients when logon hours expire' to 'Enabled'WindowsCIS Windows 8 L1 v1.0.0
1.1.21 Ensure that the --kubelet-certificate-authority argument is set as appropriateUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L1
1.1.22 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - certificateUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L1
1.1.22 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - keyUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L1
1.1.30 Ensure that the API Server only makes use of Strong Cryptographic CiphersUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L1
1.2 Ensure that Multi-Factor Authentication is 'Enabled' for All Non-Service AccountsGCPCIS Google Cloud Platform Foundation v4.0.0 L1
1.2.1 Set the 'hostname'CiscoCIS Cisco IOS XR 7.x v1.0.1 L1
1.2.2 Set 'modulus' to greater than or equal to 2048 for 'crypto key generate rsa'CiscoCIS Cisco IOS XR 7.x v1.0.1 L1
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS XE 16.x v2.1.0 L1
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS XE 17.x v2.2.1 L1
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS 15 L1 v4.1.1
1.2.3 Ensure HTTP and Telnet options are disabled for the management interfacePalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.2.3 Set 'seconds' for 'ssh timeout' for 60 seconds or lessCiscoCIS Cisco IOS XR 7.x v1.0.1 L1
1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - HTTPPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - TelnetPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.2.4.2.1.15 Set 'Configure use of smart cards on fixed data drives' to 'Enabled'WindowsCIS Windows 8 L1 v1.0.0
1.2.4.2.2.15 Set 'Require additional authentication at startup' to 'Enabled'WindowsCIS Windows 8 L1 v1.0.0
1.2.4.2.2.25 Set 'Allow enhanced PINs for startup' to 'Enabled'WindowsCIS Windows 8 L1 v1.0.0
1.2.5 Ensure valid certificate is set for browser-based administrator interface - Authentication ProfilePalo_AltoCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0
1.2.5 Ensure valid certificate is set for browser-based administrator interface - Certificate ProfilesPalo_AltoCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0
1.2.5 Ensure valid certificate is set for browser-based administrator interface - CertificatesPalo_AltoCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0
1.3 Ensure that Security Key Enforcement is Enabled for All Admin AccountsGCPCIS Google Cloud Platform Foundation v4.0.0 L2
1.4 Ensure MFA is enabled for the 'root' user accountamazon_awsCIS Amazon Web Services Foundations v5.0.0 L1
1.4 Ensure multi-factor authentication (MFA) is turned on for all human users with password-based authenticationSnowflakeCIS Snowflake Foundations v1.0.0 L1
1.5 Ensure hardware MFA is enabled for the 'root' user accountamazon_awsCIS Amazon Web Services Foundations v5.0.0 L2
1.5.1 Ensure 'V3' is selected for SNMP pollingPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.5.2 Log all Successful and Failed Administrative LoginsCiscoCIS Cisco NX-OS v1.2.0 L2
1.5.7 Set 'priv' for each 'snmp-server group' using SNMPv3CiscoCIS Cisco IOS XR 7.x v1.0.1 L2
1.5.8 Require 'aes 128' as minimum for 'snmp-server user' when using SNMPv3CiscoCIS Cisco IOS XR 7.x v1.0.1 L2
1.5.9 Set 'priv' for each 'snmp-server group' using SNMPv3CiscoCIS Cisco IOS XE 17.x v2.2.1 L1
1.5.10 Require 'aes 128' as minimum for 'snmp-server user' when using SNMPv3CiscoCIS Cisco IOS XE 17.x v2.2.1 L1
1.5.10 Require 'aes 128' as minimum for 'snmp-server user' when using SNMPv3CiscoCIS Cisco IOS 12 L2 v4.0.0
1.8.5 Ensure users must authenticate users using MFA via a graphical user logonUnixCIS Amazon Linux 2 STIG v2.0.0 STIG
1.9 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console passwordamazon_awsCIS Amazon Web Services Foundations v5.0.0 L1
1.10 Ensure required packages for multifactor authentication are installedUnixCIS Amazon Linux 2 STIG v2.0.0 STIG
1.13 Ensure the operating system has the packages required for multifactor authenticationUnixCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG
1.19 UBTU-24-100650UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.20 UBTU-24-100660UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.30 UBTU-24-100910UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.62 RHEL-09-215075UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.78 UBTU-24-400020UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.79 UBTU-24-400030UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.102 UBTU-22-612010UnixCIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.104 UBTU-22-612020UnixCIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.208 RHEL-09-255035UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.339 RHEL-09-611160UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.340 RHEL-09-611165UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
18.9.15.2 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'WindowsCIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker
18.9.15.2 Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'WindowsCIS Microsoft Windows 8.1 v2.4.1 L1
18.9.59.3.9.2 (L1) Ensure 'Require secure RPC communication' is set to 'Enabled'WindowsCIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker