Check: OKTA-APP-000560
Okta Identity as a Service (IDaaS) STIG:
OKTA-APP-000560
(in version v1 r1)
Title
The Okta Admin Console application must be configured to use multifactor authentication. (Cat I impact)
Discussion
Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor authentication requires using two or more factors to achieve authentication. Factors include: (i) something a user knows (e.g., password/PIN); (ii) something a user has (e.g., cryptographic identification device, token); or (iii) something a user is (e.g., biometric). A privileged account is defined as an information system account with authorizations of a privileged user. Network access is defined as access to an information system by a user (or a process acting on behalf of a user) communicating through a network (e.g., local area network, wide area network, or the internet). Satisfies: SRG-APP-000149, SRG-APP-000154
Check Content
From the Admin Console: 1. Go to Security >> Authentication Policies. 2. Click the "Okta Admin Console" policy. 3. Click the "Actions" button next to the top rule and select "Edit". 4. In the "User must authenticate with" field, verify that either "Password/IdP + Another factor" or "Any 2 factor types" is selected. If either of these settings is incorrect, this is a finding.
Fix Text
From the Admin Console: 1. Go to Security >> Authentication Policies. 2. Click the "Okta Admin Console" policy. 3. Click the "Actions" button next to the top rule and select "Edit". 4. In the "User must authenticate with" field, select either "Password/IdP + Another factor" or "Any 2 factor types".
Additional Identifiers
Rule ID: SV-273193r1098846_rule
Vulnerability ID: V-273193
Group Title: SRG-APP-000149
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000765 |
Implement multifactor authentication for access to privileged accounts. |
CCI-004046 |
Implement multi-factor authentication for local; network; and/or remote access to privileged accounts; and/or non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access. |
Controls
Number | Title |
---|---|
IA-2(1) |
Network Access to Privileged Accounts |