R143. Unique access credentials

Requirement

System access credentials must be unique for each actor.

References

  1. CIS Controls. 4.4 Use Unique Passwords. Where multi-factor authentication is not supported (such as local administrator, root, or service accounts), accounts will use passwords that are unique to that system

  2. HIPAA Security Rules 164.312(a)(2)(i): Unique User Identification: Assign a unique name and/or number for identifying and tracking user identity.

  3. OWASP Top 10 A2:2017-Broken Authentication. Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities temporarily or permanently.

  4. PCI DSS v3.2.1 - Requirement 6.5.10 Address common coding vulnerabilities in software-development processes such as broken authentication and session management.

  5. PCI DSS v3.2.1 - Requirement 8.1.1 Assign all users a unique ID before allowing them to access system components or cardholder data.

  6. PCI DSS v3.2.1 - Requirement 8.5 Do not use group, shared, or generic IDs, passwords, or other authentication methods.

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy