CCI-001942
The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts.
The CA API Gateway providing user authentication intermediary services must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
1 rule found Severity: Medium

CounterACT, when providing user authentication intermediary services, must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
1 rule found Severity: Medium

IBM Aspera Console must be configured with a preestablished trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate user account access authorizations and privileges.
1 rule found Severity: Medium

IBM Aspera Faspex must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
1 rule found Severity: Medium

IBM Aspera Shares must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
1 rule found Severity: Medium

The DataPower Gateway providing user authentication intermediary services must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
1 rule found Severity: Medium

The Sentry providing mobile device authentication intermediary services must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
1 rule found Severity: Medium

Nutanix AOS must implement replay-resistant authentication mechanisms for network access to privileged accounts.
1 rule found Severity: Medium

Symantec ProxySG providing user authentication intermediary services must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
1 rule found Severity: Medium

1 rule found Severity: High

The Enterprise Voice, Video, and Messaging Endpoint must be configured to implement replay-resistant authentication mechanisms for network access.
1 rule found Severity: Medium

The Enterprise Voice, Video, and Messaging Session Manager must be configured to implement attack-resistant mechanisms for Voice Video Endpoint registration.
1 rule found Severity: Medium

AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
1 rule found Severity: High

The Sentry providing mobile device authentication intermediary services must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

SLEM 5 must have SSH installed to protect the confidentiality and integrity of transmitted information.
1 rule found Severity: High

The application must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
1 rule found Severity: Medium

AOS, when used as an IPsec VPN Gateway, must use Internet Key Exchange (IKE) for IPsec VPN security associations (SAs).
1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.
1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.
1 rule found Severity: Medium

Windows Server 2019 computer clock synchronization tolerance must be limited to five minutes or less.
1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.
1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.
1 rule found Severity: Medium

Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.
1 rule found Severity: Medium

The boundary protection system (firewall) must be configured to deny network traffic by default and must allow network traffic by exception (i.e., deny all, permit by exception).
2 rules found Severity: Medium

The ESXi host must uniquely identify and must authenticate organizational users by using Active Directory.
2 rules found Severity: Low

1 rule found Severity: Medium
