STIG ID: SRG-OS-000374-GPOS-00159 | SRG: SRG-OS-000374 | Severity: medium | CCI: | Vulnerability Id: V-203726
Without re-authentication, devices may access resources or perform tasks for which they do not have authorization.
When operating systems provide the capability to change device authenticators, it is critical the device re-authenticate.
Configure the operating system to require devices to re-authenticate when changing authenticators.
Verify the operating system requires devices to re-authenticate when changing authenticators. If it does not, this is a finding.