IA-2(6)—Access To Accounts --Separate Device
>Control Description
Implement multi-factor authentication for ☑local; network; remote access to ☑privileged accounts; non-privileged accounts such that:
a. One of the factors is provided by a device separate from the system gaining access; and
b. The device meets ⚙organization-defined strength of mechanism requirements.
>Cross-Framework Mappings
>Relevant Technologies
Technology-specific guidance with authoritative sources and verification commands.
>Supplemental Guidance
The purpose of requiring a device that is separate from the system to which the user is attempting to gain access for one of the factors during multi-factor authentication is to reduce the likelihood of compromising authenticators or credentials stored on the system. Adversaries may be able to compromise such authenticators or credentials and subsequently impersonate authorized users. Implementing one of the factors on a separate device (e.g., a hardware token), provides a greater strength of mechanism and an increased level of assurance in the authentication process.
>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of IA-2(6) (Access To Accounts --Separate Device)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring IA-2(6)?
- •How frequently is the IA-2(6) policy reviewed and updated, and what triggers policy changes?
- •What governance structure ensures IA-2(6) requirements are consistently applied across all systems?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce IA-2(6) requirements.
- •What automated tools, systems, or technologies are deployed to implement IA-2(6)?
- •How is IA-2(6) integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce IA-2(6) requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of IA-2(6)?
- •What audit logs, records, reports, or monitoring data validate IA-2(6) compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of IA-2(6) effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate IA-2(6) compliance?
Ask AI
Configure your API key to use AI features.