UCF STIG Viewer Logo

The operating system must require users to re-authenticate when changing authenticators.


Overview

Finding ID Version Rule ID IA Controls Severity
V-203725 SRG-OS-000373-GPOS-00158 SV-203725r379846_rule Medium
Description
Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to change user authenticators, it is critical the user re-authenticate.
STIG Date
General Purpose Operating System Security Requirements Guide 2022-06-06

Details

Check Text ( C-3850r375182_chk )
Verify the operating system requires users to re-authenticate when changing authenticators. If it does not, this is a finding.
Fix Text (F-3850r375183_fix)
Configure the operating system to require users to re-authenticate when changing authenticators.