This is not the latest version of the STIG. This is provided for archival purposes. See the latest STIG.

The operating system must use multifactor authentication for local access to non-privileged accounts.

STIG ID: SRG-OS-000108-GPOS-00055  |  SRG: SRG-OS-000108 |  Severity: medium (CAT II)  |  CCI: CCI-000768 |  Vulnerability Id: V-203643

Vulnerability Discussion

To assure accountability, prevent unauthenticated access, and prevent misuse of the system, non-privileged users must utilize multifactor authentication for local access.

Multifactor authentication is defined as using two or more factors to achieve authentication.

Factors include:
1) Something you know (e.g., password/PIN);
2) Something you have (e.g., cryptographic identification device or token); and
3) Something you are (e.g., biometric).

A non-privileged account is defined as an operating system account with authorizations of a regular or non-privileged user.

Local access is defined as access to an organizational information system by a user (or process acting on behalf of a user) communicating through a direct connection without the use of a network.

The DoD CAC with DoD-approved PKI is an example of multifactor authentication.

Check

Verify the operating system uses multifactor authentication for local access to non-privileged accounts. If it does not, this is a finding.

Fix

Configure the operating system to use multifactor authentication for local access to non-privileged accounts.