3.5.4

  • Requirement

    Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.

  • Discussion

    Authentication processes resist replay attacks if it is impractical to successfully authenticate by recording or replaying previous authentication messages. Replay-resistant techniques include protocols that use nonces or challenges such as time synchronous or challenge-response one-time authenticators. [SP 800-63-3] provides guidance on digital identities.

More Info

  • Family

    Identification and Authentication
  • DoD Scoring Methodology Points

    1

NIST 800-171A Assessment Guidance

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!