Skip to main content

Repository → 💼 PCI DSS v3.2.1 → 💼 8 Identify and authenticate access to system components → 💼 8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication.

💼 8.3.1 Incorporate multi-factor authentication for all non-console access into the CDE for personnel with administrative access.

  • ID: /frameworks/pci-dss-v3.2.1/08/03/01

Description

Empty...

Similar

  • Sections
    • /frameworks/pci-dss-v4.0/08/04/01
    • /frameworks/aws-fsbp-v1.0.0/iam/06
  • Internal
    • ID: dec-c-4e2a36c5

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [IAM.6] Hardware MFA should be enabled for the root user1no data
💼 PCI DSS v4.0 → 💼 8.4.1 MFA is implemented for all non-console access into the CDE for personnel with administrative access.12no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 PCI DSS v4.0 → 💼 8.4.1 MFA is implemented for all non-console access into the CDE for personnel with administrative access.12no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (2)

PolicyLogic CountFlagsCompliance
🛡️ AWS Account Root User Hardware MFA is not enabled.🟢⚪🟢 x2, ⚪ x1no data
🛡️ AWS IAM User MFA is not enabled for all users with console password🟢1🟢 x6no data