Check: SLES-12-030520
SLES 12 STIG:
SLES-12-030520
(in versions v3 r2 through v1 r1)
Title
The SUSE operating system must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM). (Cat II impact)
Discussion
Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the information system is compromised, that compromise will not affect credentials stored on the authentication device. Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD Common Access Card. A privileged account is defined as an information system account with authorizations of a privileged user. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. This requirement only applies to components where this is specific to the function of the device or has the concept of an organizational user (e.g., VPN, proxy capability). This does not apply to authentication for the purpose of configuring the device itself (management). Satisfies: SRG-OS-000068-GPOS-00036, SRG-OS-000105-GPOS-00052, SRG-OS-000106-GPOS-00053, SRG-OS-000107-GPOS-00054, SRG-OS-000108-GPOS-00055, SRG-OS-000375-GPOS-00160, SRG-OS-000375-GPOS-00161, SRG-OS-000375-GPOS-00162
Check Content
Verify the SUSE operating system implements multifactor authentication for remote access to privileged accounts via pluggable authentication modules (PAM). Check that the "pam_pkcs11.so" option is configured in the "/etc/pam.d/common-auth" file with the following command: # grep pam_pkcs11.so /etc/pam.d/common-auth auth sufficient pam_pkcs11.so If "pam_pkcs11.so" is not set in "/etc/pam.d/common-auth", this is a finding.
Fix Text
Configure the SUSE operating system to implement multifactor authentication for remote access to privileged accounts via PAM. Add or update "pam_pkcs11.so" in "/etc/pam.d/common-auth" to match the following line: auth sufficient pam_pkcs11.so
Additional Identifiers
Rule ID: SV-217301r1015233_rule
Vulnerability ID: V-217301
Group Title: SRG-OS-000068-GPOS-00036
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000187 |
For public key-based authentication, map the authenticated identity to the account of the individual or group. |
CCI-000765 |
Implement multifactor authentication for access to privileged accounts. |
CCI-000766 |
Implement multifactor authentication for access to non-privileged accounts. |
CCI-000767 |
The information system implements multifactor authentication for local access to privileged accounts. |
CCI-000768 |
The information system implements multifactor authentication for local access to non-privileged accounts. |
CCI-001948 |
The information system implements multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access. |
CCI-001953 |
Accept Personal Identity Verification-compliant credentials. |
CCI-001954 |
Electronically verify Personal Identity Verification-compliant credentials. |
CCI-004046 |
Implement multi-factor authentication for local; network; and/or remote access to privileged accounts; and/or non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access. |
Controls
Number | Title |
---|---|
IA-2(1) |
Network Access to Privileged Accounts |
IA-2(2) |
Network Access to Non-privileged Accounts |
IA-2(3) |
Local Access to Privileged Accounts |
IA-2(4) |
Local Access to Non-privileged Accounts |
IA-2(11) |
Remote Access - Separate Device |
IA-2(12) |
Acceptance of PIV Credentials |
IA-5(2) |
Pki-based Authentication |