Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
DiscussionAuthentication processes resist replay attacks if it is impractical to successfully authenticate by recording or replaying previous authentication messages. Replay-resistant techniques include protocols that use nonces or challenges such as time synchronous or challengeresponse one-time authenticators. NIST SP 800-63-3 provides guidance on digital identities.
Further DiscussionWhen insecure protocols are used for access to computing resources, an adversary may be able to capture login information and immediately reuse (replay) it for other purposes. It is important to use mechanisms that resist this technique.
ExampleTo protect your IT infrastructure, you understand that the methods for authentication must not be easily copied and re-sent to your systems by an adversary. You select Kerberos for authentication because of its built-in resistance to replay attacks. As a next step you upgrade all of your web applications to require Transport Layer Security (TLS), which also is replayresistant. Your use of MFA to protect remote access also confers some replay resistance.
Potential Assessment Considerations
- Are only anti-replay authentication mechanisms used [a]?