UCF STIG Viewer Logo

The operating system must use organization defined replay-resistant authentication mechanisms for network access to non-privileged accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33088 SRG-OS-000113-NA SV-43486r1_rule Medium
Description
An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Rationale for non-applicability: For the purposes of this SRG, a mobile operating system is assumed to support a single human-accessible user account. Access to privileged accounts on mobile operating systems is prohibited.
STIG Date
Mobile Operating System Security Requirements Guide 2013-07-03

Details

Check Text ( C-41347r1_chk )
This requirement is NA for the Mobile OS SRG.
Fix Text (F-36988r1_fix)
The requirement is NA. No fix is required.