CSCv7|4.5

Title

Use Multifactor Authentication For All Administrative Access

Description

Use multi-factor authentication and encrypted channels for all administrative account access.

Reference Item Details

Category: Controlled Use of Administrative Privileges

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.1 Ensure that multi-factor authentication is enabled for all privileged usersmicrosoft_azureCIS Microsoft Azure Foundations v1.3.1 L1
1.1.2 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged Usersmicrosoft_azureCIS Microsoft Azure Foundations v1.5.0 L1
1.1.2 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged Usersmicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L1
1.1.2 Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged Usersmicrosoft_azureCIS Microsoft Azure Foundations v2.1.0 L1
1.1.21 Ensure that the --kubelet-certificate-authority argument is set as appropriateUnixCIS Kubernetes 1.13 Benchmark v1.4.0 L1
1.1.21 Ensure that the --kubelet-certificate-authority argument is set as appropriateUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L1
1.1.22 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - certificateUnixCIS Kubernetes 1.13 Benchmark v1.4.0 L1
1.1.22 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - certificateUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L1
1.1.22 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - keyUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L1
1.1.22 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - keyUnixCIS Kubernetes 1.13 Benchmark v1.4.0 L1
1.1.30 Ensure that the API Server only makes use of Strong Cryptographic CiphersUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L1
1.1.30 Ensure that the API Server only makes use of Strong Cryptographic CiphersUnixCIS Kubernetes 1.13 Benchmark v1.4.0 L1
1.2.1 Set the 'hostname'CiscoCIS Cisco IOS XR 7.x v1.0.0 L1
1.2.2 Set 'modulus' to greater than or equal to 2048 for 'crypto key generate rsa'CiscoCIS Cisco IOS XR 7.x v1.0.0 L1
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS XE 16.x v2.1.0 L1
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS 16 L1 v1.1.2
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS 15 L1 v4.1.0
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS 17 L1 v1.0.0
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS 16 L1 v2.0.0
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS 17 L1 v2.0.0
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS XE 17.x v2.1.0 L1
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS 15 L1 v4.1.1
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS 16 L1 v1.1.0
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS 16 L1 v1.1.1
1.2.3 Ensure HTTP and Telnet options are disabled for the management interfacePalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.2.3 Ensure that A Multi-factor Authentication Policy Exists for Administrative Groupsmicrosoft_azureCIS Microsoft Azure Foundations v1.5.0 L1
1.2.3 Ensure that A Multi-factor Authentication Policy Exists for Administrative Groupsmicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L1
1.2.3 Ensure that A Multi-factor Authentication Policy Exists for Administrative Groupsmicrosoft_azureCIS Microsoft Azure Foundations v2.1.0 L1
1.2.3 Set 'seconds' for 'ssh timeout' for 60 seconds or lessCiscoCIS Cisco IOS XR 7.x v1.0.0 L1
1.2.4 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - certificateUnixCIS Kubernetes v1.20 Benchmark v1.0.0 L1 Master
1.2.4 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - keyUnixCIS Kubernetes v1.20 Benchmark v1.0.0 L1 Master
1.2.5 Ensure that the --kubelet-certificate-authority argument is set as appropriateUnixCIS Kubernetes v1.20 Benchmark v1.0.0 L1 Master
1.2.5 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - certificateUnixCIS Kubernetes Benchmark v1.6.1 L1 Master
1.2.5 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - certificateUnixCIS Kubernetes Benchmark v1.5.1 L1
1.2.5 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - keyUnixCIS Kubernetes Benchmark v1.6.1 L1 Master
1.2.5 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - keyUnixCIS Kubernetes Benchmark v1.5.1 L1
1.2.5 Ensure valid certificate is set for browser-based administrator interface - Authentication ProfilePalo_AltoCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0
1.2.5 Ensure valid certificate is set for browser-based administrator interface - Certificate ProfilesPalo_AltoCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0
1.2.5 Ensure valid certificate is set for browser-based administrator interface - CertificatesPalo_AltoCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0
1.2.6 Ensure Multi-factor Authentication is Required for Azure Managementmicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L1
1.2.6 Ensure Multi-factor Authentication is Required for Azure Managementmicrosoft_azureCIS Microsoft Azure Foundations v1.5.0 L1
1.2.6 Ensure Multifactor Authentication is Required for Windows Azure Service Management APImicrosoft_azureCIS Microsoft Azure Foundations v2.1.0 L1
1.2.34 Ensure that the API Server only makes use of Strong Cryptographic CiphersUnixCIS Kubernetes v1.20 Benchmark v1.0.0 L1 Master
1.2.35 Ensure that the API Server only makes use of Strong Cryptographic CiphersUnixCIS Kubernetes Benchmark v1.6.1 L1 Master
1.2.35 Ensure that the API Server only makes use of Strong Cryptographic CiphersUnixCIS Kubernetes Benchmark v1.5.1 L1
1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console passwordamazon_awsCIS Amazon Web Services Foundations L1 1.5.0
1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console passwordamazon_awsCIS Amazon Web Services Foundations L1 2.0.0
1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console passwordamazon_awsCIS Amazon Web Services Foundations L1 1.3.0
1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console passwordamazon_awsCIS Amazon Web Services Foundations L1 1.4.0
1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console passwordamazon_awsCIS Amazon Web Services Foundations L1 3.0.0