Skip to main content
NetStable
Level 2 IA.L2-3.5.4

Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts

📖 What This Means

This control requires organizations to implement authentication mechanisms that protect against replay attacks, where an attacker intercepts and retransmits valid authentication data to gain unauthorized access. This means ensuring that each authentication session is unique and cannot be reused by attackers. For example, using one-time passwords (OTP) or time-based tokens ensures that even if an attacker captures the authentication data, it cannot be reused. This applies to all network access, whether by privileged accounts (like administrators) or non-privileged accounts (regular users). Real-world examples include implementing multi-factor authentication (MFA) with time-based one-time passwords (TOTP) or using secure session tokens in web applications.

🎯 Why It Matters

Replay attacks can lead to unauthorized access to sensitive systems and data, potentially resulting in data breaches, financial loss, and reputational damage. For example, in 2017, a replay attack on a major cryptocurrency exchange resulted in the theft of millions of dollars. The DoD emphasizes this control to protect Controlled Unclassified Information (CUI) and ensure the integrity of authentication processes. Without replay-resistant mechanisms, attackers can easily exploit intercepted credentials, leading to significant security incidents.

How to Implement

  1. Enable MFA for all user accounts in AWS/Azure/GCP.
  2. Use OAuth 2.0 with PKCE (Proof Key for Code Exchange) for secure token exchange.
  3. Implement session management with short-lived tokens and token rotation.
  4. Use AWS Cognito, Azure AD, or Google Identity Platform for secure authentication.
  5. Enable logging and monitoring for authentication events to detect replay attempts.
⏱️
Estimated Effort
Implementation typically takes 2-3 days for cloud environments and 3-5 days for on-premise setups, depending on the complexity. Requires intermediate knowledge of authentication systems.

📋 Evidence Examples

MFA Configuration Screenshot

Format: PNG/JPG
Frequency: Annually or after changes.
Contents: Screenshot showing MFA enabled for all user accounts.
Collection: Capture from AWS/Azure/GCP console.

Authentication Policy Document

Format: PDF/DOCX
Frequency: Annually or after updates.
Contents: Policy detailing replay-resistant mechanisms and MFA requirements.
Collection: Export from internal policy repository.

Authentication Logs

Format: CSV/Log
Frequency: Monthly.
Contents: Logs showing successful and failed authentication attempts.
Collection: Export from authentication server or cloud provider.

MFA Enrollment Report

Format: CSV/PDF
Frequency: Quarterly.
Contents: Report showing percentage of users enrolled in MFA.
Collection: Generate from MFA provider.

Testing Results

Format: PDF/DOCX
Frequency: Annually.
Contents: Documentation of testing replay-resistant mechanisms.
Collection: Conduct internal tests and document results.

📝 SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For IA.L2-3.5.4 ("Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe how users, devices, and processes are identified and authenticated, including your IAM platform, password policies, MFA implementation, certificate management, and service account controls. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"IA.L2-3.5.4 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to employ replay-resistant authentication mechanisms for network access to privileg.... The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"IA.L2-3.5.4 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to employ replay-resistant authentication mechanisms for network access to privileg.... Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"IA.L2-3.5.4 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • Identify all authentication entry points (local login, VPN, cloud, API)
  • Document the identity provider(s) and authentication flow
  • Specify MFA methods and coverage
  • Ensure this control covers all systems within your defined CUI boundary where employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts applies
  • Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • 📄 Identification and Authentication Policy
  • 📄 Password policy configuration
  • 📄 MFA enrollment records
  • 📄 Service account registry
  • 📄 Evidence artifacts specific to IA.L2-3.5.4
  • 📄 POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will test authentication mechanisms, verify MFA is enforced for required access paths, check password policy configuration, and review service account documentation.

💬 Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Is MFA enabled for all user accounts?

✅ YES → Proceed to Q2
❌ NO → GAP: Enable MFA for all user accounts within 30 days.
Remediation:
Use Duo Security or Azure AD to configure MFA.

Question 2: Are authentication tokens short-lived and rotated?

✅ YES → Proceed to Q3
❌ NO → GAP: Implement token rotation and set token lifetimes to 1 hour.
Remediation:
Configure session management in AWS/Azure/GCP.

Question 3: Is logging enabled for authentication events?

✅ YES → Proceed to Q4
❌ NO → GAP: Enable logging for authentication events within 14 days.
Remediation:
Use AWS CloudTrail, Azure Monitor, or Google Cloud Logging.

Question 4: Is there a documented authentication policy?

✅ YES → Proceed to Q5
❌ NO → GAP: Draft and approve an authentication policy within 30 days.
Remediation:
Include replay-resistant mechanisms and MFA requirements.

Question 5: Have replay-resistant mechanisms been tested?

✅ YES → Compliant
❌ NO → GAP: Conduct testing of replay-resistant mechanisms within 30 days.
Remediation:
Perform internal tests and document results.

⚠️ Common Mistakes (What Auditors Flag)

1. Not enabling MFA for all accounts.

Why this happens: Overlooking non-privileged accounts.
How to avoid: Ensure MFA is enforced for both privileged and non-privileged accounts.

2. Using long-lived authentication tokens.

Why this happens: Lack of understanding of token security.
How to avoid: Implement short-lived tokens and token rotation.

3. Insufficient logging of authentication events.

Why this happens: Not configuring logging properly.
How to avoid: Enable and regularly review authentication logs.

4. Lack of documented authentication policies.

Why this happens: Assuming informal practices are sufficient.
How to avoid: Formalize and regularly update authentication policies.

5. Not testing replay-resistant mechanisms.

Why this happens: Assuming implementation is sufficient without testing.
How to avoid: Conduct regular testing and document results.

📚 Parent Policy

This practice is governed by the Identification and Authentication Policy

View IA Policy →

📚 Related Controls