1.104 UBTU-22-612020

Information

The operating system must implement smart card logins for multifactor authentication for local and network access to privileged and nonprivileged accounts.

GROUP ID: V-260575
RULE ID: SV-260575r1044770

Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased.

Multifactor authentication requires using two or more factors to achieve authentication.

Factors include:

- Something a user knows (e.g., password/PIN);
- Something a user has (e.g., cryptographic identification device, token); and
- Something a user is (e.g., biometric).

A privileged account is defined as an information system account with authorizations of a privileged user.

Network access is defined as access to an information system by a user (or a process acting on behalf of a user) communicating through a network (e.g., local area network, wide area network, or the internet).

The DOD common access card (CAC) with DOD-approved PKI is an example of multifactor authentication.

Satisfies: SRG-OS-000105-GPOS-00052, SRG-OS-000106-GPOS-00053, SRG-OS-000107-GPOS-00054, SRG-OS-000108-GPOS-00055

Solution

Configure the operating system to use multifactor authentication for access to accounts.

Add or modify the following line in the "/etc/pam.d/common-auth" file:

auth [success=3 default=ignore] pam_pkcs11.so

Add or modify the following line in the "/etc/ssh/sshd_config" file:

PubkeyAuthentication yes

See Also

https://workbench.cisecurity.org/benchmarks/22168

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(1), CAT|II, CCI|CCI-000765, CSCv7|16.3, Rule-ID|SV-260575r1044770_rule, STIG-ID|UBTU-22-612020, Vuln-ID|V-260575

Plugin: Unix

Control ID: c0ecae44d946df3386b2cac8c6e1630137ee9f3d0800e193db131725ed76d5ea