800-53|IA-2

Title

IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)

Description

The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).

Supplemental

Organizational users include employees or individuals that organizations deem to have equivalent status of employees (e.g., contractors, guest researchers). This control applies to all accesses other than: (i) accesses that are explicitly identified and documented in AC-14; and (ii) accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. Organizations employ passwords, tokens, or biometrics to authenticate user identities, or in the case multifactor authentication, or some combination thereof. Access to organizational information systems is defined as either local access or network access. Local access is any access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained by direct connections without the use of networks. Network access is access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained through network connections (i.e., nonlocal accesses). Remote access is a type of network access that involves communication through external networks (e.g., the Internet). Internal networks include local area networks and wide area networks. In addition, the use of encrypted virtual private networks (VPNs) for network connections between organization-controlled endpoints and non-organization controlled endpoints may be treated as internal networks from the perspective of protecting the confidentiality and integrity of information traversing the network. Organizations can satisfy the identification and authentication requirements in this control by complying with the requirements in Homeland Security Presidential Directive 12 consistent with the specific organizational implementation plans. Multifactor authentication requires the use of two or more different factors to achieve authentication. The factors are defined as: (i) something you know (e.g., password, personal identification number [PIN]); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric). Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD common access card. In addition to identifying and authenticating users at the information system level (i.e., at logon), organizations also employ identification and authentication mechanisms at the application level, when necessary, to provide increased information security. Identification and authentication requirements for other than organizational users are described in IA-8.

Reference Item Details

Related: AC-14,AC-17,AC-18,AC-2,AC-3,IA-4,IA-5,IA-8

Category: IDENTIFICATION AND AUTHENTICATION

Family: IDENTIFICATION AND AUTHENTICATION

Priority: P1

Baseline Impact: LOW,MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.1.1 Enable 'aaa new-model'CiscoCIS Cisco IOS 12 L1 v4.0.0
1.1.1 Ensure that the --anonymous-auth argument is set to falseUnixCIS Kubernetes 1.8 Benchmark v1.2.0 L1
1.1.1 Ensure that the --anonymous-auth argument is set to falseUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L1
1.1.1 Ensure that the --anonymous-auth argument is set to falseUnixCIS Kubernetes 1.11 Benchmark v1.3.0 L1
1.1.2 Enable 'aaa authentication login'CiscoCIS Cisco IOS 12 L1 v4.0.0
1.1.2 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0'WindowsCIS Microsoft Windows 8.1 v2.4.1 L1
1.1.3 Enable 'aaa authentication enable default'CiscoCIS Cisco IOS 12 L1 v4.0.0
1.1.3 Ensure that the --insecure-allow-any-token argument is not setUnixCIS Kubernetes 1.11 Benchmark v1.3.0 L1
1.1.3 Ensure that the --insecure-allow-any-token argument is not setUnixCIS Kubernetes 1.13 Benchmark v1.4.1 L1
1.1.3 Ensure that the --insecure-allow-any-token argument is not setUnixCIS Kubernetes 1.8 Benchmark v1.2.0 L1
1.1.3.8.1 Set 'Microsoft network server: Disconnect clients when logon hours expire' to 'Enabled'WindowsCIS Windows 8 L1 v1.0.0
1.1.3.10.2 Set 'Network access: Allow anonymous SID/Name translation' to 'Disabled'WindowsCIS Windows 8 L1 v1.0.0
1.1.3.10.4 Configure 'Network access: Named Pipes that can be accessed anonymously'WindowsCIS Windows 8 L1 v1.0.0
1.1.4 Ensure that the --insecure-allow-any-token argument is not setUnixCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1
1.1.4 Set 'login authentication for 'line con 0'CiscoCIS Cisco IOS 12 L1 v4.0.0
1.1.5 Set 'login authentication for 'line tty'CiscoCIS Cisco IOS 12 L1 v4.0.0
1.1.6 Set 'login authentication for 'line vty'CiscoCIS Cisco IOS 12 L1 v4.0.0
1.2 Ensure that Multi-Factor Authentication is 'Enabled' for All Non-Service AccountsGCPCIS Google Cloud Platform v3.0.0 L1
1.2.1 Set the 'hostname'CiscoCIS Cisco IOS XR 7.x v1.0.0 L1
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS XE 16.x v2.1.0 L1
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS 15 L1 v4.1.1
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCiscoCIS Cisco IOS XE 17.x v2.1.0 L1
1.2.3 Ensure HTTP and Telnet options are disabled for the management interfacePalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.2.3 Set 'seconds' for 'ssh timeout' for 60 seconds or lessCiscoCIS Cisco IOS XR 7.x v1.0.0 L1
1.2.3.5 Set 'RPC Runtime Unauthenticated Client Restriction to Apply:' to 'Enabled:Authenticated'WindowsCIS Windows 8 L1 v1.0.0
1.2.3.6 Set 'Enable RPC Endpoint Mapper Client Authentication' to 'Disabled'WindowsCIS Windows 8 L1 v1.0.0
1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - HTTPPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - TelnetPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.2.4.2.1.15 Set 'Configure use of smart cards on fixed data drives' to 'Enabled'WindowsCIS Windows 8 L1 v1.0.0
1.2.4.2.2.15 Set 'Require additional authentication at startup' to 'Enabled'WindowsCIS Windows 8 L1 v1.0.0
1.2.4.2.2.25 Set 'Allow enhanced PINs for startup' to 'Enabled'WindowsCIS Windows 8 L1 v1.0.0
1.2.4.5.4 Set 'Always prompt for password upon connection' to 'Enabled'WindowsCIS Windows 8 L1 v1.0.0
1.2.8 - /etc/security/user - 'sugroups=ALL su=true'UnixCIS AIX 5.3/6.1 L1 v1.1.0
1.4.3.6 Ensure 'aaa authentication telnet console' is configured correctlyCiscoCIS Cisco Firewall ASA 9 L1 v4.1.0
1.5.1 Ensure 'V3' is selected for SNMP pollingPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
1.5.10 Require 'aes 128' as minimum for 'snmp-server user' when using SNMPv3CiscoCIS Cisco IOS 12 L2 v4.0.0
1.008 - Shared user accounts are permitted on the system.WindowsDISA Windows Vista STIG v6r41
1.10 Ensure required packages for multifactor authentication are installedUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
2.1.1 Ensure 'SECURE_CONTROL_' Is Set In 'listener.ora'UnixCIS Oracle Server 12c Linux v3.0.0
2.1.1 Ensure 'SECURE_CONTROL_' Is Set In 'listener.ora'UnixCIS Oracle Server 18c Linux v1.1.0
2.1.1 Ensure 'SECURE_CONTROL_' Is Set In 'listener.ora'WindowsCIS Oracle Server 18c Windows v1.1.0
2.08 Listener password - 'Use OS Authentication'WindowsCIS v1.1.0 Oracle 11g OS Windows Level 1
2.08 Listener password - 'Use OS Authentication'UnixCIS v1.1.0 Oracle 11g OS L1
13.2 Verify No Legacy '+' Entries Exist in /etc/passwd FileUnixCIS Debian Linux 7 L1 v1.0.0
13.2 Verify No Legacy "+" Entries Exist in /etc/passwd FileUnixCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0
13.3 Verify No Legacy '+' Entries Exist in /etc/shadow FileUnixCIS Debian Linux 7 L1 v1.0.0
13.3 Verify No Legacy "+" Entries Exist in /etc/shadow FileUnixCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0
13.4 Verify No Legacy '+' Entries Exist in /etc/group FileUnixCIS Debian Linux 7 L1 v1.0.0
13.4 Verify No Legacy "+" Entries Exist in /etc/group FileUnixCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0
15 - AuthenticationUnixTNS Best Practice JBoss 7 Linux