STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← IA-11 — Re-Authentication

CCI-002039

Definition

The organization requires devices to reauthenticate upon organization-defined circumstances or situations requiring reauthentication.

Parent Control

IA-11Re-AuthenticationIdentification and Authentication

Linked STIG Checks (7)

V-237337CAT IThe ArcGIS Server Windows authentication must authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.ArcGIS for Server 10.3 Security Technical Implementation GuideV-230144CAT IIThe Arista Multilayer Switch must re-authenticate 802.1X connected devices every hour.Arista Multilayer Switch DCS-7000 Series L2S Security Technical Implementation GuideV-266627CAT IIAOS must require devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication.HPE Aruba Networking AOS Wireless Security Technical Implementation GuideV-233898CAT IIThe Infoblox system must require devices to reauthenticate for each zone transfer and dynamic update request connection attempt.Infoblox 8.x DNS Security Technical Implementation GuideV-215599CAT IIThe Windows 2012 DNS Server must require devices to re-authenticate for each dynamic update request connection attempt.Microsoft Windows 2012 Server Domain Name System Security Technical Implementation GuideV-254097CAT IINutanix AOS must automatically terminate a user session after 15 minutes of inactivity.Nutanix AOS 5.20.x Application Security Technical Implementation GuideV-254086CAT IIInnoslate must initiate a session lock after a 15-minute period of inactivity.SPEC Innovations Innoslate 4.x Security Technical Implementation Guide