💼 IA-2(8) Identification and Authentication (organizational Users) | Access to Accounts — Replay Resistant
- Contextual name: 💼 IA-2(8) Identification and Authentication (organizational Users) | Access to Accounts — Replay Resistant
- ID:
/frameworks/nist-sp-800-53-r5/ia/02/08
- Located in: 💼 IA-2 Identification and Authentication (organizational Users)
Description
Implement replay-resistant authentication mechanisms for access to [Selection (one or more): privileged accounts; non-privileged accounts].
Similar
- Sections
/frameworks/aws-fsbp-v1.0.0/iam/05
/frameworks/aws-fsbp-v1.0.0/iam/06
- Internal
- ID:
dec-c-fb2286b2
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [IAM.5] MFA should be enabled for all IAM users that have a console password | 1 | |||
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [IAM.6] Hardware MFA should be enabled for the root user | 1 |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 FedRAMP High Security Controls → 💼 IA-2(8) Access to Accounts — Replay Resistant (L)(M)(H) | 2 | |||
💼 FedRAMP Low Security Controls → 💼 IA-2(8) Access to Accounts — Replay Resistant (L)(M)(H) | 2 |
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (2)
Policy | Logic Count | Flags |
---|---|---|
📝 AWS Account Root User Hardware MFA is not enabled. 🟢 | 🟢 x3 | |
📝 AWS IAM User MFA is not enabled for all users with console password 🟢 | 1 | 🟢 x6 |