STIGhub
STIGs
RMF Controls
Compare
← All Controls
IA-2 (11)
Identification and Authentication
Rev 4
Identification and Authentication (Organizational Users)
CCI Identifiers (6)
CCI-001947
The organization defines the strength of mechanism requirements for the device that is separate from the system gaining access and is to provide one factor of a multifactor authentication for remote access to privileged accounts.
CCI-001948
The information system implements multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
CCI-001949
The device used in the information system implementation of multifactor authentication for remote access to privileged accounts meets organization-defined strength of mechanism requirements.
CCI-001950
The organization defines the strength of mechanism requirements for the device that is separate from the system gaining access and is to provide one factor of a multifactor authentication for remote access to non-privileged accounts.
CCI-001951
The information system implements multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
CCI-001952
The device used in the information system implementation of multifactor authentication for remote access to non-privileged accounts meets organization-defined strength of mechanism requirements.
Linked STIG Checks (47)
Across 24 STIGs. Click to expand.
▶
CA API Gateway ALG Security Technical Implementation Guide
2 checks
▶
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
1 check
▶
F5 BIG-IP Access Policy Manager Security Technical Implementation Guide
2 checks
▶
F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide
2 checks
▶
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
1 check
▶
ForeScout CounterACT ALG Security Technical Implementation Guide
1 check
▶
IBM AIX 7.x Security Technical Implementation Guide
1 check
▶
IBM Aspera Platform 4.2 Security Technical Implementation Guide
3 checks
▶
Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation Guide
1 check
▶
Ivanti Sentry 9.x ALG Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2016 Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2019 Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2022 Security Technical Implementation Guide
1 check
▶
Oracle Linux 7 Security Technical Implementation Guide
4 checks
▶
Oracle Linux 8 Security Technical Implementation Guide
2 checks
▶
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
4 checks
▶
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
2 checks
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
6 checks
▶
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
3 checks
▶
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
3 checks
▶
Symantec ProxySG ALG Security Technical Implementation Guide
2 checks
▶
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
1 check