CDP 35948458: Require Multi-Factor Authentication #14
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CDP Control ID:
35948458Category: Secure Application Development
Frequency: Annually
Owner: h.noerenberg
Parent: #1
Requirement & Guidance
Secure Application Development Requirement: All authentication to application/platform designed, developed and/or maintained by Accenture or Accenture's subcontractors must have multi-factor authentication enabled (MFA). Attachments Required (as applicable): Screenshot verifying login through MFA (Screenshot of Application access page - or VPN, VDI, Citrix, RDP, etc., and SSO showing the MFA solution in place) Guidance: Multi-factor authentication indicates multiple forms of identifying oneself to the application - from the list of three possible factors - what you know (username + passwords); what you have (tokens, smart cards); what you are (fingerprints, retina scans.). Additional information can be found on CDP website User Access Management and in the Identification and Authentication Standard, and Remote Console Access Security Standard.
CapaKraken Action Plan — 35948458 Multi-Factor Authentication
Scope: MFA für alle Authentication-Flows (VPN, VDI, Citrix, RDP, App-Login, SSO).
Aktueller Stand:
docs/acn-security-compliance-status.md3.2.2.2.01 OK — TOTP viaotpauth, QR-Setup, Sign-in IntegrationTodos:
mfaRequired: trueals DefaultDateien:
apps/web/src/app/(auth)/signin/*,packages/api/src/router/auth/mfa.tsCapaKraken Compliance-Status
EAPPS-Mapping:
3.2.2.2.01Status: ✅ OK (laut
docs/acn-security-compliance-status.md)Zusammenfassung
TOTP-basierte MFA ist implementiert (RFC 6238 via
otpauth), mit QR-Setup-Flow und Sign-in-Integration.Nachweis
apps/web/src/components/security/MfaSetup.tsxpackages/api/src/__tests__/user-self-service-mfa.test.tsapps/web/src/server/auth.tsHinweis (offener Restpunkt — separat zu tracken)
MFA ist aktuell optional pro User. Für Admin-/privilegierte Rollen ist Enforcement laut Detail-Checkliste #31 (Check: Multi factor authentication at least on sensitive transactions pages and for admin access) sinnvoll → als Follow-up in #31 tracken.
Entscheidung: Control ist nachweislich erfüllt → Ticket wird geschlossen.