IA-2 (8)
IA-2 (8): Network Access To Privileged Accounts - Replay Resistant
The information system implements replay-resistant authentication mechanisms for network access to privileged accounts.
Supplemental
Authentication processes resist replay attacks if it is impractical to achieve successful authentications by replaying previous authentication messages. Replay-resistant techniques include, for example, protocols that use nonces or challenges such as Transport Layer Security (TLS) and time synchronous or challenge-response one-time authenticators.
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | unknown |
Overlays |
---|
None |