Check: OL6-00-000349
Oracle Linux 6 STIG:
OL6-00-000349
(in versions v2 r7 through v1 r9)
Title
The system must be configured to require the use of a CAC, PIV compliant hardware token, or Alternate Logon Token (ALT) for authentication. (Cat II impact)
Discussion
Smart card login provides two-factor authentication stronger than that provided by a username/password combination. Smart cards leverage a PKI (public key infrastructure) in order to provide and verify credentials.
Check Content
Interview the SA to determine if all accounts not exempted by policy are using CAC authentication. For DoD systems, the following systems and accounts are exempt from using smart card (CAC) authentication: Standalone systems Application accounts Temporary employee accounts, such as students or interns, who cannot easily receive a CAC or PIV Operational tactical locations that are not collocated with RAPIDS workstations to issue CAC or ALT Test systems, such as those with an Interim Approval to Test (IATT) and use a separate VPN, firewall, or security measure preventing access to network and system components from outside the protection boundary documented in the IATT. If non-exempt accounts are not using CAC authentication, this is a finding.
Fix Text
To enable smart card authentication, consult the documentation at: https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Managing_Smart_Cards/enabling-smart-card-login.html For guidance on enabling SSH to authenticate against a Common Access Card (CAC), consult documentation at: https://access.redhat.com/solutions/82273
Additional Identifiers
Rule ID: SV-209051r793772_rule
Vulnerability ID: V-209051
Group Title: SRG-OS-000105
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000765 |
The information system implements multifactor authentication for network access to privileged accounts. |
Controls
Number | Title |
---|---|
IA-2 (1) |
Network Access To Privileged Accounts |