Skip to main content

๐Ÿ’ผ IA-2(6) Access to Accounts โ€”separate Device (M)(H)

Descriptionโ€‹

Implement multi-factor authentication for [FedRAMP Assignment: local, network and remote] access to [FedRAMP Assignment: privileged accounts; non-privileged accounts] such that:

(a) One of the factors is provided by a device separate from the system gaining access; and

(b) The device meets [FedRAMP Assignment: FIPS-validated or NSA-approved cryptography].

IA-2 (6) Additional FedRAMP Requirements and Guidance:

Guidance: PIV=separate device. Please refer to NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials.

Guidance: See SC-13 Guidance for more information on FIPS-validated or NSA-approved cryptography.

Similarโ€‹

  • Sections
    • /frameworks/fedramp-high-security-controls/ia/02/06
  • Internal
    • ID: dec-c-3e8bd6ae

Similar Sections (Take Policies From)โ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ IA-2(6) Access to Accounts โ€”separate Device (M)(H)2

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags

Policies (2)โ€‹

PolicyLogic CountFlags
๐Ÿ“ AWS Account Root User Hardware MFA is not enabled. ๐ŸŸข๐ŸŸข x3
๐Ÿ“ AWS IAM User MFA is not enabled for all users with console password ๐ŸŸข1๐ŸŸข x6