3.5.4 Employ replay-resistant authentication mechanisms for network access to privileged and no-privileged accounts.
- Tufts University - Replay Attack Vulnerabilities and Mitigation Strategies
- Federal Identity, Credential, & Access Management - Approved Products List
- Sitepoint - How to Prevent Replay Attacks on Your Website
- Red Hat Customer Portal - Chapter 20. Directory Servers
- Windows IT Center - AS DS Deployment
- SANS Institute - Global Information Assurance Certification Paper
- DFARS FAQ Q47