RSA response to Fox-IT report and Best Practices for RSA SecurID
Originally Published: 2020-01-14
Article Number
Applies To
CVE Identifier(s)
Article Summary
Resolution
- The adversary must have access to a software token XML file.
- The file must have been created without a password.
Important Statement from RSA Regarding RSA SecurID Software Token Provisioning Best Practices
Disclaimer
Related Articles
Best practices for using Data Access Governance (DAG) in RSA Identity Governance & Lifecycle 63Number of Views Best practices for RSA Authentication Manager 8.x 381Number of Views RSA SecurID Authentication Engine Security Best Practices Guide (Japanese) 74Number of Views Best Practices to Mitigate Password-Spraying Attacks 340Number of Views RSA SecurID Software Token Security Best Practices Guide for RSA Authentication Manager 8.x 193Number of Views
Trending Articles
RSA Release Notes for RSA Authentication Manager 8.8 Downloading RSA Authentication Manager license files or RSA Software token seed records AFX Server remains in a 'Not running' State, afx status shows 'timed out waiting for AFX applications to start' and mule_e… RSA Authentication Manager 8.7 SP1 Patch 1 Hotfix 1 RSA Authentication Manager 8.8 Security Configuration Guide
Don't see what you're looking for?