UCF STIG Viewer Logo

Two-factor authentication must be implemented to restrict access to all network elements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-251369 NET0445 SV-251369r806062_rule Medium
Description
Without secure management implemented with authenticated access controls, strong two-factor authentication, encryption of the management session and audit logs, unauthorized users may gain access to network managed devices compromised, large parts of the network could be incapacitated with only a few commands.
STIG Date
Network Infrastructure Policy Security Technical Implementation Guide 2022-11-21

Details

Check Text ( C-54804r806060_chk )
Review all network element configurations to ensure that an authentication server is being used. Then verify that a two-factor authentication method has been implemented. The RADIUS or TACACS server referenced in the configurations will call a two-factor authentication server.

If two-factor authentication is not being used to access all network elements, this is a finding.
Fix Text (F-54757r806061_fix)
The network administrator must ensure strong two-factor authentication is being incorporated in the access scheme.