Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-000766
CCI
CCI|CCI-000766
Title
Implement multifactor authentication for network access to non-privileged accounts.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
5.5.7 Ensure multi-factor authentication is enable for users - module
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.5.7 Ensure multi-factor authentication is enable for users - pam_pkcs11
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.5.7 Ensure multi-factor authentication is enable for users - removal
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
AIX7-00-003200 - The AIX operating system must use Multi Factor Authentication.
Unix
DISA STIG AIX 7.x v3r1
AOSX-14-003020 - The macOS system must use multifactor authentication for local and network access to privileged and non-privileged accounts - ChallengeResponseAuthentication
Unix
DISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-003020 - The macOS system must use multifactor authentication for local and network access to privileged and non-privileged accounts - enforceSmartCard
Unix
DISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-003020 - The macOS system must use multifactor authentication for local and network access to privileged and non-privileged accounts - PasswordAuthentication
Unix
DISA STIG Apple Mac OSX 10.14 v2r6
APPL-14-001150 - The macOS system must disable password authentication for SSH.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r2
APPL-14-003020 - The macOS system must enforce smart card authentication.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r2
APPL-14-003030 - The macOS system must allow smart card authentication.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r2
APPL-14-003050 - The macOS system must enforce multifactor authentication for logon.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r2
APPL-14-003051 - The macOS system must enforce multifactor authentication for the su command.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r2
APPL-14-003052 - The macOS system must enforce multifactor authentication for privilege escalation through the sudo command.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r2
APPL-15-001150 - The macOS system must disable password authentication for SSH.
Unix
DISA Apple macOS 15 (Sequoia) STIG v1r1
APPL-15-003020 - The macOS system must enforce smart card authentication.
Unix
DISA Apple macOS 15 (Sequoia) STIG v1r1
APPL-15-003030 - The macOS system must allow smart card authentication.
Unix
DISA Apple macOS 15 (Sequoia) STIG v1r1
APPL-15-003050 - The macOS system must enforce multifactor authentication for login.
Unix
DISA Apple macOS 15 (Sequoia) STIG v1r1
APPL-15-003051 - The macOS system must enforce multifactor authentication for the su command.
Unix
DISA Apple macOS 15 (Sequoia) STIG v1r1
APPL-15-003052 - The macOS system must enforce multifactor authentication for privilege escalation through the sudo command.
Unix
DISA Apple macOS 15 (Sequoia) STIG v1r1
Big Sur - Enforce multifactor authentication for network access to non-privileged accounts
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
CASA-VN-000440 - The Cisco ASA remote access VPN server must be configured to enforce certificate-based authentication before granting access to the network.
Cisco
DISA STIG Cisco ASA VPN v2r2
Catalina - Enforce multifactor authentication for network access to non-privileged accounts
Unix
NIST macOS Catalina v1.5.0 - All Profiles
Catalina - Enforce Smartcard Authentication
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Low
Catalina - Enforce Smartcard Authentication
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Moderate
Catalina - Enforce Smartcard Authentication
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Enforce Smartcard Authentication
Unix
NIST macOS Catalina v1.5.0 - 800-171
Catalina - Enforce Smartcard Authentication
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Enforce Smartcard Authentication
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 Low
Catalina - Enforce Smartcard Authentication
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 Moderate
Catalina - Enforce Smartcard Authentication
Unix
NIST macOS Catalina v1.5.0 - All Profiles
Catalina - Enforce Smartcard Authentication
Unix
NIST macOS Catalina v1.5.0 - CNSSI 1253
DKER-EE-002180 - SAML integration must be enabled in Docker Enterprise.
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2
F5BI-AP-000079 - The BIG-IP APM module must use multifactor authentication for network access to non-privileged accounts.
F5
DISA F5 BIG-IP Access Policy Manager STIG v2r3
F5BI-LT-000079 - The BIG-IP Core implementation providing user authentication intermediary services must use multifactor authentication for network access to non-privileged accounts when granting access to virtual servers.
F5
DISA F5 BIG-IP Local Traffic Manager STIG v2r3
GEN005527 - The SSH daemon must not allow host-based authentication.
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN005527 - The SSH daemon must not allow host-based authentication.
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
JUSX-VN-000019 - The Juniper SRX Services Gateway VPN must use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts.
Juniper
DISA Juniper SRX Services Gateway VPN v3r1
Monterey - Enforce multifactor authentication for network access to non-privileged accounts
Unix
NIST macOS Monterey v1.0.0 - All Profiles
O112-C2-012900 - The DBMS must use multifactor authentication for access to user accounts.
Unix
DISA STIG Oracle 11.2g v2r5 Linux
O112-C2-012900 - The DBMS must use multifactor authentication for access to user accounts.
Windows
DISA STIG Oracle 11.2g v2r5 Windows
O121-C2-012900 - The DBMS must use multifactor authentication for access to user accounts.
Unix
DISA STIG Oracle 12c v3r1 Linux
O121-C2-012900 - The DBMS must use multifactor authentication for access to user accounts.
Windows
DISA STIG Oracle 12c v3r1 Windows
OL6-00-000234 - The SSH daemon must ignore .rhosts files - 'IgnoreRhosts yes'
Unix
DISA STIG Oracle Linux 6 v2r7
OL6-00-000236 - The SSH daemon must not allow host-based authentication.
Unix
DISA STIG Oracle Linux 6 v2r7
OL6-00-000239 - The SSH daemon must not allow authentication using an empty password.
Unix
DISA STIG Oracle Linux 6 v2r7
OL07-00-010300 - The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using an empty password.
Unix
DISA Oracle Linux 7 STIG v2r14
OL08-00-020250 - OL 8 must implement multifactor authentication for access to interactive accounts.
Unix
DISA Oracle Linux 8 STIG v2r2
RHEL-06-000234 - The SSH daemon must ignore .rhosts files.
Unix
DISA Red Hat Enterprise Linux 6 STIG v2r2
RHEL-06-000236 - The SSH daemon must not allow host-based authentication.
Unix
DISA Red Hat Enterprise Linux 6 STIG v2r2
RHEL-06-000239 - The SSH daemon must not allow authentication using an empty password.
Unix
DISA Red Hat Enterprise Linux 6 STIG v2r2