UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must use multifactor authentication for network access to privileged accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-55105 SRG-APP-000149-NDM-000247 SV-69351r4_rule Medium
Description
Multifactor authentication requires using two or more factors to achieve authentication. Factors include: (i) something a user knows (e.g., password/PIN); (ii) something a user has (e.g., cryptographic identification device, token); or (iii) something a user is (e.g., biometric). A privileged account is defined as an information system account with authorizations of a privileged user. Network access is defined as access to an information system by a user (or a process acting on behalf of a user) communicating through a network (e.g., LAN, WAN, or the Internet). This requirement does not apply to the account of last resort or root account. DoD prohibits local user accounts on the device, except for an account of last resort and (where applicable) a root account.
STIG Date
Network Device Management Security Requirements Guide 2019-09-27

Details

Check Text ( C-55727r4_chk )
Determine if the network device is configured to use multifactor authentication for network access to privileged users, including administrator accounts. Network access may use a properly implemented authentication server for validation of credentials.

If multifactor authentication is not used for network access to all privileged accounts, this is a finding.
Fix Text (F-59971r3_fix)
Configure the network device to use multifactor authentication for network access to privileged accounts. This requirement does not apply to the account of last resort or root account. DoD prohibits local user accounts on the device, except for an account of last resort and (where applicable) a root account.