๐ผ IA-2(6) Identification and Authentication (organizational Users) | Access to Accounts โseparate Device
- Contextual name: ๐ผ IA-2(6) Identification and Authentication (organizational Users) | Access to Accounts โseparate Device
- ID:
/frameworks/nist-sp-800-53-r5/ia/02/06
- Located in: ๐ผ IA-2 Identification and Authentication (organizational Users)
Descriptionโ
Implement multi-factor authentication for [Selection (one or more): local; network; remote] access to [Selection (one or more): privileged accounts; non-privileged accounts] such that: (a) One of the factors is provided by a device separate from the system gaining access; and (b) The device meets [Assignment: organization-defined strength of mechanism requirements].
Similarโ
- Sections
/frameworks/aws-fsbp-v1.0.0/iam/05
/frameworks/aws-fsbp-v1.0.0/iam/06
- Internal
- ID:
dec-c-3e8bd6ae
- ID:
Similar Sections (Take Policies From)โ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
๐ผ AWS Foundational Security Best Practices v1.0.0 โ ๐ผ [IAM.5] MFA should be enabled for all IAM users that have a console password | 1 | |||
๐ผ AWS Foundational Security Best Practices v1.0.0 โ ๐ผ [IAM.6] Hardware MFA should be enabled for the root user | 1 |
Similar Sections (Give Policies To)โ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
๐ผ FedRAMP High Security Controls โ ๐ผ IA-2(6) Access to Accounts โseparate Device (M)(H) | 2 |
Sub Sectionsโ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (2)โ
Policy | Logic Count | Flags |
---|---|---|
๐ AWS Account Root User Hardware MFA is not enabled. ๐ข | ๐ข x3 | |
๐ AWS IAM User MFA is not enabled for all users with console password ๐ข | 1 | ๐ข x6 |