STIGhub
STIGs
RMF Controls
Compare
← All Controls
IA-2 (9)
Identification and Authentication
Rev 3
Identification and Authentication (Organizational Users)
CCI Identifiers (3)
CCI-000775
The organization defines replay-resistant authentication mechanisms to be used for network access to non-privileged accounts.
CCI-000776
The information system uses organization-defined replay-resistant authentication mechanisms for network access to non-privileged accounts.
CCI-001942
The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts.
Linked STIG Checks (47)
Across 32 STIGs. Click to expand.
▶
Application Security and Development Security Technical Implementation Guide
1 check
▶
ArcGIS for Server 10.3 Security Technical Implementation Guide
1 check
▶
Arctic Wolf CylanceON-PREM Security Technical Implementation Guide
1 check
▶
CA API Gateway ALG Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
1 check
▶
ForeScout CounterACT ALG Security Technical Implementation Guide
1 check
▶
HPE Aruba Networking AOS VPN Security Technical Implementation Guide
1 check
▶
IBM AIX 7.x Security Technical Implementation Guide
1 check
▶
IBM Aspera Platform 4.2 Security Technical Implementation Guide
3 checks
▶
IBM DataPower ALG Security Technical Implementation Guide
1 check
▶
Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation Guide
1 check
▶
Ivanti Sentry 9.x ALG Security Technical Implementation Guide
1 check
▶
Juniper SRX Services Gateway VPN Security Technical Implementation Guide
1 check
▶
Juniper SRX SG VPN Security Technical Implementation Guide
1 check
▶
Microsoft Edge Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2016 Security Technical Implementation Guide
5 checks
▶
Microsoft Windows Server 2019 Security Technical Implementation Guide
5 checks
▶
Microsoft Windows Server 2022 Security Technical Implementation Guide
6 checks
▶
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
1 check
▶
Okta Identity as a Service (IDaaS) Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
1 check
▶
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
1 check
▶
Solaris 11 SPARC Security Technical Implementation Guide
1 check
▶
Solaris 11 X86 Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
1 check
▶
Symantec ProxySG ALG Security Technical Implementation Guide
1 check
▶
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide
1 check
▶
VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 ESXi Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 ESXi Security Technical Implementation Guide
1 check