3.5.4 — Replay-Resistant Auth
What It Says
Section titled “What It Says”Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
What It Actually Means
Section titled “What It Actually Means”An attacker sitting on your network captures an authentication exchange. Can they replay it to gain access? If yes, you fail this requirement.
What’s replay-resistant:
- Time-based one-time passwords (TOTP) — expires in 30 seconds
- FIDO2 / WebAuthn — challenge-response tied to the specific session
- Kerberos tickets — time-limited, session-specific
- Certificate-based authentication — signed challenge-response
- Windows Hello for Business — hardware-bound, not replayable
What’s NOT replay-resistant:
- Passwords alone — captured password works forever until changed
- NTLM authentication — vulnerable to pass-the-hash and relay attacks
- Long-lived API tokens — captured token works until revoked
- Basic authentication over HTTP — credentials sent in every request
If you’ve implemented MFA properly (3.5.3) using TOTP, FIDO2, or similar methods, you likely satisfy this requirement as well. The key gap to check: are there any authentication paths still using password-only or legacy protocols?
Pass or Fail
Section titled “Pass or Fail”Your assessor needs a “yes” to every row:
| # | Question | What “yes” looks like |
|---|---|---|
| 1 | Are replay-resistant authentication mechanisms employed for network access to privileged accounts? | Admin network authentication uses TOTP, FIDO2, Kerberos, or certificate-based methods |
| 2 | Are replay-resistant authentication mechanisms employed for network access to non-privileged accounts? | Standard user network auth uses replay-resistant methods — MFA satisfies this |
What to Have Ready on Assessment Day
Section titled “What to Have Ready on Assessment Day”Documents they’ll review: Identification and authentication policy; procedures addressing user identification and authentication; system security plan; system design documentation; system configuration settings; system audit logs and records
People they’ll talk to: Personnel with system operations responsibilities; personnel with information security responsibilities; system or network administrators; system developers
Live demos they’ll ask for: Mechanisms supporting or implementing identification and authentication capability
The Assessor’s Playbook
Section titled “The Assessor’s Playbook”These are the actual questions. Have answers ready.
- “What authentication protocols are used for network access?”
- “Is NTLM still enabled in your environment? Where and why?”
- “Are there any authentication paths using long-lived tokens or basic auth?”
- “Show me that your MFA method is replay-resistant — how does it work?”
- “How do you handle API authentication — are tokens time-limited?”
Where Companies Trip Up
Section titled “Where Companies Trip Up”NTLM still enabled. Legacy applications requiring NTLM authentication. Disable where possible, document compensating controls where you can’t.
Basic authentication on email. Exchange still accepting basic auth for IMAP/POP3/SMTP. Disable legacy auth protocols in Entra ID.
Long-lived API tokens. API keys that never expire and can be captured and reused indefinitely. Use OAuth with short-lived tokens and refresh token rotation.
Password-only VPN. VPN authenticating with password only, no MFA — both a 3.5.3 and 3.5.4 failure.
How to Talk About This
Section titled “How to Talk About This”Connected Requirements
Section titled “Connected Requirements”| Requirement | Why it matters here |
|---|---|
| 3.5.3 — MFA Everywhere | MFA implementation directly provides replay resistance |
| 3.5.10 — Never Plain Text | Protects credentials from interception that enables replay |
| 3.13.15 — Protect Session Integrity | Session protection complements replay-resistant auth |
Implementation (coming soon)
Section titled “Implementation (coming soon)”Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.
CMMC Practice ID: IA.L2-3.5.4 | SPRS Weight: 1 point | POA&M Eligible: Yes