⭐ Repository → 💼 PCI DSS v3.2.1 → 💼 8 Identify and authenticate access to system components → 💼 8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication.
💼 8.3.1 Incorporate multi-factor authentication for all non-console access into the CDE for personnel with administrative access.
- ID:
/frameworks/pci-dss-v3.2.1/08/03/01
Description
Empty...
Similar
- Sections
/frameworks/pci-dss-v4.0/08/04/01
/frameworks/aws-fsbp-v1.0.0/iam/06
- Internal
- ID:
dec-c-4e2a36c5
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [IAM.6] Hardware MFA should be enabled for the root user | 1 | no data | |||
💼 PCI DSS v4.0 → 💼 8.4.1 MFA is implemented for all non-console access into the CDE for personnel with administrative access. | 1 | 2 | no data |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 PCI DSS v4.0 → 💼 8.4.1 MFA is implemented for all non-console access into the CDE for personnel with administrative access. | 1 | 2 | no data |
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|
Policies (2)
Policy | Logic Count | Flags | Compliance |
---|---|---|---|
🛡️ AWS Account Root User Hardware MFA is not enabled.🟢⚪ | 🟢 x2, ⚪ x1 | no data | |
🛡️ AWS IAM User MFA is not enabled for all users with console password🟢 | 1 | 🟢 x6 | no data |