8.4: 1. MFA is implemented for all non-console access into the CDE for personnel with administrative access.
  • Examine network and/or system configurations to verify MFA is required for all non- console into the CDE for personnel with administrative access.
  • Observe administrator personnel logging into the CDE and verify that MFA is required.

Description

Purpose

Requiring more than one type of authentication factor reduces the probability that an attacker can gain access to a system by masquerading as a legitimate user, because the attacker would need to compromise multiple authentication factors. This is especially true in environments where traditionally the single authentication factor employed was something a user knows such as a password or passphrase.

Good Practice

Implementing MFA for non-console administrative access to in-scope system components that are not part of the CDE will help prevent unauthorized users from using a single factor to gain access and compromise in-scope system components.

Definitions

Using one factor twice (for example, using two separate passwords) is not considered multi- factor authentication.

8.4: 2. MFA is implemented for all non-console access into the CDE.
  • Examine network and/or system configurations to verify MFA is implemented for all non-console access into the CDE.
  • Observe personnel logging in to the CDE and examine evidence to verify that MFA is required.

Description

Purpose

Requiring more than one type of authentication factor reduces the probability that an attacker can gain access to a system by masquerading as a legitimate user, because the attacker would need to compromise multiple authentication factors. This is especially true in environments where traditionally the single authentication factor employed was something a user knows such as a password or passphrase.#### Definitions Using one factor twice (for example, using two separate passwords) is not considered multi- factor authentication.

Refer to Appendix G for the definition of “phishing resistant authentication.”

8.4: 3. MFA is implemented for all remote access originating from outside the entity’s network that could access or impact the CDE.
  • Examine network and/or system configurations for remote access servers and systems to verify MFA is required in accordance with all elements specified in this requirement.
  • Observe personnel (for example, users and administrators) and third parties connecting remotely to the network and verify that multi-factor authentication is required.

Description

Purpose

Requiring more than one type of authentication factor reduces the probability that an attacker can gain access to a system by masquerading as a legitimate user, because the attacker would need to compromise multiple authentication factors. This is especially true in environments where traditionally the single authentication factor employed was something a user knows, such as a password or passphrase.

Definitions

Multi-factor authentication (MFA) requires an individual to present a minimum of two of the three authentication factors specified in Requirement 8.3.1 before access is granted.

Using one factor twice (for example, using two separate passwords) is not considered multi- factor authentication.