Skip to main content

πŸ’Ό PR.AA-03: Users, services, and hardware are authenticated

Description​

  1. Require multifactor authentication
  2. Enforce policies for the minimum strength of passwords, PINs, and similar authenticators
  3. Periodically reauthenticate users, services, and hardware based on risk (e.g., in zero trust architectures)
  4. Ensure that authorized personnel can access accounts essential for protecting safety under emergency conditions

Similar​

  • Sections
    • /frameworks/nist-csf-v1.1/pr-ac/03
    • /frameworks/nist-csf-v1.1/pr-ac/07
    • /frameworks/nist-sp-800-53-r5/ac/07
    • /frameworks/nist-sp-800-53-r5/ac/12
    • /frameworks/nist-sp-800-53-r5/ia/02
    • /frameworks/nist-sp-800-53-r5/ia/03
    • /frameworks/nist-sp-800-53-r5/ia/05
    • /frameworks/nist-sp-800-53-r5/ia/07
    • /frameworks/nist-sp-800-53-r5/ia/08
    • /frameworks/nist-sp-800-53-r5/ia/09
    • /frameworks/nist-sp-800-53-r5/ia/10
    • /frameworks/nist-sp-800-53-r5/ia/11

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.AC-3: Remote access is managed
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals' security and privacy risks and other organizational risks)1922
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-7 Unsuccessful Logon Attempts4
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-12 Session Termination3
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό IA-2 Identification and Authentication (organizational Users)132
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό IA-3 Device Identification and Authentication4
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό IA-5 Authenticator Management184
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό IA-7 Cryptographic Module Authentication
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό IA-8 Identification and Authentication (non-organizational Users)6
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό IA-9 Service Identification and Authentication2
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό IA-10 Adaptive Authentication
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό IA-11 Re-authentication

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (22)​

PolicyLogic CountFlags
πŸ“ AWS Account IAM Password Policy Number of passwords to remember is not set to 24 🟒1🟒 x6
πŸ“ AWS Account Root User credentials were used is the last 30 days πŸ”΄πŸŸ’1πŸ”΄ x1, 🟒 x6
πŸ“ AWS EC2 Instance IAM role is not attached 🟒1🟒 x6
πŸ“ AWS IAM Policy allows full administrative privileges 🟒1🟒 x6
πŸ“ AWS IAM Server Certificate is expired 🟒1🟒 x6
πŸ“ AWS IAM User Access Keys are not rotated every 90 days or less 🟒1🟒 x6
πŸ“ AWS IAM User has inline or directly attached policies 🟒1🟠 x1, 🟒 x5
πŸ“ AWS IAM User has more than one active access key 🟒1🟒 x6
πŸ“ AWS IAM User MFA is not enabled for all users with console password 🟒1🟒 x6
πŸ“ AWS IAM User with console and programmatic access set during the initial creation 🟒🟒 x3
πŸ“ AWS KMS Symmetric CMK Rotation is not enabled 🟒1🟒 x6
πŸ“ AWS S3 Bucket MFA Delete is not enabled 🟠🟒1🟠 x1, 🟒 x6
πŸ“ Azure App Service Authentication is disabled and Basic Authentication is enabled 🟒1🟒 x6
πŸ“ Azure App Service Basic Authentication is enabled 🟒🟒 x3
πŸ“ Azure App Service is not registered with Microsoft Entra ID 🟒1🟒 x6
πŸ“ Azure Key Vault Soft Delete and Purge Protection functions are not enabled 🟒1🟒 x6
πŸ“ Azure Non-RBAC Key Vault stores Keys without expiration date 🟒1🟒 x6
πŸ“ Azure Non-RBAC Key Vault stores Secrets without expiration date 🟒1🟒 x6
πŸ“ Azure RBAC Key Vault stores Keys without expiration date 🟒1🟒 x6
πŸ“ Azure RBAC Key Vault stores Secrets without expiration date 🟒1🟒 x6
πŸ“ Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP) 🟒1🟒 x6
πŸ“ Consumer Google Accounts are used 🟒🟒 x3