UCF STIG Viewer Logo

The operating system must use organization defined replay-resistant authentication mechanisms for network access to privileged accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33087 SRG-OS-000112-NA SV-43485r1_rule Medium
Description
An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Rationale for non-applicability: For the purposes of this SRG, a mobile operating system is assumed to support a single human-accessible user account. Access to privileged accounts on mobile operating systems is prohibited.
STIG Date
Mobile Operating System Security Requirements Guide 2013-07-03

Details

Check Text ( C-41346r1_chk )
This requirement is NA for the Mobile OS SRG.
Fix Text (F-36987r1_fix)
The requirement is NA. No fix is required.