STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Akamai KSD Service Impact Level 2 NDM Security Technical Implementation Guide

Version

V1R1

Benchmark ID

Akamai_KSD_Service_IL2_NDM_STIG

Total Checks

24

Tags

other
CAT I: 2CAT II: 20CAT III: 2

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSON

Checks (24)

V-76457MEDIUMUpon successful login, the Akamai Luna Portal must notify the administrator of the date and time of the last login.V-76459MEDIUMThe Akamai Luna Portal must notify the administrator of the number of successful login attempts.V-76461MEDIUMThe Akamai Luna Portal must initiate a session logoff after a 15-minute period of inactivity.V-76463MEDIUMThe Akamai Luna Portal must automatically audit account creation.V-76465MEDIUMThe Akamai Luna Portal must automatically audit account modification.V-76467MEDIUMThe Akamai Luna Portal must automatically audit account removal actions.V-76469MEDIUMThe Akamai Luna Portal must generate alerts that can be forwarded to the SAs and ISSO when accounts are created.V-76471MEDIUMThe Akamai Luna Portal must generate alerts that can be forwarded to the SAs and ISSO when accounts are modified.V-76473MEDIUMThe Akamai Luna Portal must generate alerts that can be forwarded to the SAs and ISSO when accounts are removed.V-76475MEDIUMThe Akamai Luna Portal must automatically audit account enabling actions.V-76477MEDIUMThe Akamai Luna Portal must notify the SAs and ISSO when accounts are created, or enabled when previously disabled.V-76479MEDIUMThe Akamai Luna Portal must audit the execution of privileged functions.V-76481LOWThe Akamai Luna Portal must provide audit record generation capability for DoD-defined auditable events within the network device.V-76483LOWThe Akamai Luna Portal must generate audit records when successful/unsuccessful attempts to access privileges occur.V-76485MEDIUMThe Akamai Luna Portal must enforce a minimum 15-character password length.V-76487MEDIUMIf multifactor authentication is not supported and passwords must be used, the Akamai Luna Portal must enforce password complexity by requiring that at least one upper-case character be used.V-76489MEDIUMIf multifactor authentication is not supported and passwords must be used, the Akamai Luna Portal must enforce password complexity by requiring that at least one lower-case character be used.V-76491MEDIUMIf multifactor authentication is not supported and passwords must be used, the Akamai Luna Portal must enforce password complexity by requiring that at least one numeric character be used.V-76493MEDIUMIf multifactor authentication is not supported and passwords must be used, the Akamai Luna Portal must enforce password complexity by requiring that at least one special character be used.V-76495MEDIUMThe Akamai Luna Portal must enforce a 60-day maximum password lifetime restriction.V-76497MEDIUMThe Akamai Luna Portal must prohibit password reuse for a minimum of five generations.V-76499MEDIUMThe Akamai Luna Portal must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 15 minutes of inactivity except to fulfill documented and validated mission requirements.V-76501HIGHThe Akamai Luna Portal must employ Security Assertion Markup Language (SAML) to automate central management of administrators.V-76503HIGHThe Akamai Luna Portal must employ Single Sign On (SSO) with Security Assertion Markup Language (SAML) integration to verify authentication settings.