UCF STIG Viewer Logo

The operating system must implement smart card logons for multifactor authentication for access to privileged accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-72435 RHEL-07-041004 SV-87059r2_rule Medium
Description
Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the information system is compromised, that compromise will not affect credentials stored on the authentication device. Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD Common Access Card. A privileged account is defined as an information system account with authorizations of a privileged user. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. This requirement only applies to components where this is specific to the function of the device or has the concept of an organizational user (e.g., VPN, proxy capability). This does not apply to authentication for the purpose of configuring the device itself (management). Requires further clarification from NIST. Satisfies: SRG-OS-000375-GPOS-00160, SRG-OS-000375-GPOS-00161, SRG-OS-000375-GPOS-00162
STIG Date
Red Hat Enterprise Linux 7 Security Technical Implementation Guide 2017-07-08

Details

Check Text ( C-72635r2_chk )
Verify the operating system requires smart card logons for multifactor authentication to uniquely identify privileged users.

Check to see if smartcard authentication is enforced on the system with the following command:

# authconfig --test | grep -i smartcard

The entry for use only smartcard for logon may be enabled, and the smartcard module and smartcard removal actions must not be blank.

If smartcard authentication is disabled or the smartcard and smartcard removal actions are blank, this is a finding.
Fix Text (F-78787r2_fix)
Configure the operating system to implement smart card logon for multifactor authentication to uniquely identify privileged users.

Enable smart card logons with the following commands:

#authconfig --enablesmartcard --smartcardaction=1 --update
# authconfig --enablerequiresmartcard --update