The Central Log Server must use multifactor authentication for network access to non-privileged user accounts.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-206462 | SRG-APP-000150-AU-002320 | SV-206462r960975_rule | CCI-000766 | medium |
| Description | ||||
| To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor authentication uses two or more factors to achieve authentication. Factors include: (i) Something you know (e.g., password/PIN); (ii) Something you have (e.g., cryptographic identification device, token); or (iii) Something you are (e.g., biometric). A non-privileged account is any information system account with authorizations of a non-privileged user. Network access is any access to an application by a user (or process acting on behalf of a user) where said access is obtained through a network connection. Applications integrating with the DoD Active Directory and utilize the DoD CAC are examples of compliant multifactor authentication solutions. | ||||
| STIG | Date | |||
| Central Log Server Security Requirements Guide | 2024-12-04 | |||
Details
Check Text (C-206462r960975_chk)
Examine the configuration.
Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for logon via the network for all non-privileged accounts.
If the Central Log Server is not configured to use multifactor authentication for network access to non-privileged user accounts, this is a finding.
Fix Text (F-6722r285631_fix)
This requirement applies to all non-privileged accounts used for access to the system via network access.
For systems where individual users access, configure and/or manage the system, configure the Central Log Server to use DoD PKI (preferred) or another multifactor authentication solution for network access to logon to the Central Log Server.