IA-2 (1) Network Access To Privileged Accounts | LOW | The information system implements multifactor authentication for network access to privileged accounts. IA-2 (2) Network Access To Non-Privileged Accounts | MODERATE | The information system implements multifactor authentication for network access to non-privileged accounts. IA-2 (3) Local Access To Privileged Accounts | MODERATE | The information system implements multifactor authentication for local access to privileged accounts. IA-2 (4) Local Access To Non-Privileged Accounts | HIGH | The information system implements multifactor authentication for local access to non-privileged accounts. IA-2 (5) Group Authentication | | Requiring individuals to use individual authenticators as a second level of authentication helps organizations to mitigate the risk of using group authenticators. The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed. IA-2 (6) Network Access To Privileged Accounts - Separate Device | | The information system implements multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets Assignment: organization-defined strength of mechanism requirements. IA-2 (7) Network Access To Non-Privileged Accounts - Separate Device | | The information system implements multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets Assignment: organization-defined strength of mechanism requirements. IA-2 (8) Network Access To Privileged Accounts - Replay Resistant | MODERATE | Authentication processes resist replay attacks if it is impractical to achieve successful authentications by replaying previous authentication messages. Replay-resistant techniques include, for example, protocols that use nonces or challenges such as Transport Layer Security (TLS) and time synchronous or challenge-response one-time authenticators. The information system implements replay-resistant authentication mechanisms for network access to privileged accounts. IA-2 (9) Network Access To Non-Privileged Accounts - Replay Resistant | HIGH | Authentication processes resist replay attacks if it is impractical to achieve successful authentications by recording/replaying previous authentication messages. Replay-resistant techniques include, for example, protocols that use nonces or challenges such as Transport Layer Security (TLS) and time synchronous or challenge-response one-time authenticators. The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts. Single sign-on enables users to log in once and gain access to multiple information system resources. Organizations consider the operational efficiencies provided by single sign-on capabilities with the increased risk from disclosures of single authenticators providing access to multiple system resources. The information system provides a single sign-on capability for Assignment: organization-defined list of information system accounts and services. IA-2 (11) Remote Access - Separate Device | MODERATE | For remote access to privileged/non-privileged accounts, the purpose of requiring a device that is separate from the information system gaining access for one of the factors during multifactor authentication is to reduce the likelihood of compromising authentication credentials stored on the system. For example, adversaries deploying malicious code on organizational information systems can potentially compromise such credentials resident on the system and subsequently impersonate authorized users. The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets Assignment: organization-defined strength of mechanism requirements. IA-2 (12) Acceptance Of Piv Credentials | LOW | This control enhancement applies to organizations implementing logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials. The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials. IA-2 (13) Out-Of-Band Authentication | | Out-of-band authentication (OOBA) refers to the use of two separate communication paths to identify and authenticate users or devices to an information system. The first path (i.e., the in-band path), is used to identify and authenticate users or devices, and generally is the path through which information flows. The second path (i.e., the out-of-band path) is used to independently verify the authentication and/or requested action. For example, a user authenticates via a notebook computer to a remote server to which the user desires access, and requests some action of the server via that communication path. Subsequently, the server contacts the user via the user�s cell phone to verify that the requested action originated from the user. The user may either confirm the intended action to an individual on the telephone or provide an authentication code via the telephone. This type of authentication can be employed by organizations to mitigate actual or suspected man-in the-middle attacks. The conditions for activation can include, for example, suspicious activities, new threat indicators or elevated threat levels, or the impact level or classification level of information in requested transactions. The information system implements Assignment: organization-defined out-of-band authentication under Assignment: organization-defined conditions. |