STIGhub
STIGs
RMF Controls
Compare
← All Controls
IA-2 (6)
Identification and Authentication
Rev 3
Identification and Authentication (Organizational Users)
CCI Identifiers (7)
CCI-000771
The information system uses multifactor authentication for network access to privileged accounts where one of the factors is provided by a device separate from the information system being accessed.
CCI-001935
The organization defines the strength of mechanism requirements for the device that is separate from the system gaining access to privileged accounts.
CCI-001936
The information system implements multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
CCI-001937
The device used in the information system implementation of multifactor authentication for network access to privileged accounts meets organization-defined strength of mechanism requirements.
CCI-004046
Implement multi-factor authentication for local; network; and/or remote access to privileged accounts; and/or non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
CCI-004047
Implement multi-factor authentication for local; network; and/or remote access to privileged accounts; and/or non-privileged accounts such that the device meets organization-defined strength of mechanism requirements.
CCI-004048
Defines the strength of mechanism requirements for implementing multi-factor authentication.
Linked STIG Checks (124)
Across 57 STIGs. Click to expand.
▶
Amazon Linux 2023 Security Technical Implementation Guide
6 checks
▶
Anduril NixOS Security Technical Implementation Guide
1 check
▶
Apache Tomcat Application Server 9 Security Technical Implementation Guide
1 check
▶
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
5 checks
▶
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
5 checks
▶
Application Layer Gateway Security Requirements Guide
2 checks
▶
Application Server Security Requirements Guide
2 checks
▶
Arctic Wolf CylanceON-PREM Security Technical Implementation Guide
1 check
▶
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
3 checks
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
4 checks
▶
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
2 checks
▶
Central Log Server Security Requirements Guide
2 checks
▶
Cisco ISE NDM Security Technical Implementation Guide
1 check
▶
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
6 checks
▶
Container Platform Security Requirements Guide
2 checks
▶
Database Security Requirements Guide
2 checks
▶
Dell OS10 Switch NDM Security Technical Implementation Guide
1 check
▶
Domain Name System (DNS) Security Requirements Guide
2 checks
▶
Forescout Network Device Management Security Technical Implementation Guide
1 check
▶
General Purpose Operating System Security Requirements Guide
2 checks
▶
HYCU Protege Security Technical Implementation Guide
1 check
▶
IBM AIX 7.x Security Technical Implementation Guide
1 check
▶
Ivanti Connect Secure NDM Security Technical Implementation Guide
1 check
▶
Ivanti Sentry 9.x ALG Security Technical Implementation Guide
1 check
▶
Juniper EX Series Switches Network Device Management Security Technical Implementation Guide
1 check
▶
Juniper SRX Services Gateway NDM Security Technical Implementation Guide
1 check
▶
Mainframe Product Security Requirements Guide
2 checks
▶
Microsoft Entra ID Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2025 Security Technical Implementation Guide
1 check
▶
Network Device Management Security Requirements Guide
2 checks
▶
Nutanix Acropolis Application Server Security Technical Implementation Guide
2 checks
▶
Okta Identity as a Service (IDaaS) Security Technical Implementation Guide
2 checks
▶
Oracle Linux 7 Security Technical Implementation Guide
4 checks
▶
Oracle Linux 8 Security Technical Implementation Guide
3 checks
▶
Oracle Linux 9 Security Technical Implementation Guide
8 checks
▶
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
7 checks
▶
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
2 checks
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
6 checks
▶
Riverbed NetIM NDM Security Technical Implementation Guide
1 check
▶
Riverbed NetProfiler Security Technical Implementation Guide
1 check
▶
Splunk Enterprise 7.x for Windows Security Technical Implementation Guide
1 check
▶
Splunk Enterprise 8.x for Linux Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
3 checks
▶
Symantec Edge SWG ALG Security Technical Implementation Guide
1 check
▶
Symantec Edge SWG NDM Security Technical Implementation Guide
1 check
▶
Tanium 7.x Application on TanOS Security Technical Implementation Guide
1 check
▶
Tanium 7.x Operating System on TanOS Security Technical Implementation Guide
2 checks
▶
Tanium 7.x Security Technical Implementation Guide
2 checks
▶
Trend Micro TippingPoint NDM Security Technical Implementation Guide
1 check
▶
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
2 checks
▶
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
2 checks
▶
Unified Endpoint Management Server Security Requirements Guide
1 check
▶
Virtual Machine Manager Security Requirements Guide
2 checks
▶
Virtual Private Network (VPN) Security Requirements Guide
1 check
▶
Web Server Security Requirements Guide
2 checks
▶
Xylok Security Suite 20.x Security Technical Implementation Guide
1 check