6.4
IG1 IG2 IG3

Require MFA for Remote Network Access

Asset Type: Users
Security Function: Protect

Description

Require MFA for remote network access.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Identify systems requiring multi-factor authentication
7
Select and deploy MFA solution
8
Enroll users and distribute authentication factors
9
Test MFA across all identified systems

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

VPN Credential Theft Enabling Network Intrusion

Confidentiality

Stolen VPN credentials grant attackers direct network access from the internet because remote access relies on passwords alone without a second authentication factor.

Remote Access Broker Selling Stolen VPN Credentials

Availability

Initial access brokers sell compromised VPN credentials on dark web markets; buyers use them to access enterprise networks for ransomware deployment when MFA is not enforced.

Vulnerabilities (When Safeguard Absent)

No MFA for Remote Network Access

Remote access connections (VPN, remote desktop gateway) protected only by passwords can be compromised by any attacker who obtains or guesses valid credentials.

Remote Access as Single Point of Failure

Without MFA, the VPN or remote access gateway becomes a single-password-away entry point to the entire internal network from anywhere on the internet.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Technical MFA enrollment status and enforcement configuration Reviewed monthly
Document Governing policy document (current, approved, communicated) Reviewed annually