UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

AAA Services used to authenticate privileged users for device management must be configured to connect to the management network.


Overview

Finding ID Version Rule ID IA Controls Severity
V-80937 SRG-APP-000516-AAA-000630 SV-95647r1_rule Medium
Description
Using standardized authentication protocols such as RADIUS, TACACS+, and Kerberos, an authentication server provides centralized and robust authentication services for the management of network components. In order to control access to the servers as well as monitor traffic to them, the authentication servers should only be connected to the management network.
STIG Date
Authentication, Authorization, and Accounting Services (AAA) Security Requirements Guide 2018-10-01

Details

Check Text ( C-80675r1_chk )
If AAA Services are not used for authentication of privileged users to AAA Services, this is not applicable.

Verify AAA Services are configured to connect to the management network. Confirm AAA Services are not dual-homed by physically inspecting the physical LAN connection.

If AAA Services are configured to connect to a non-management network, this is a finding.
Fix Text (F-87793r1_fix)
Configure AAA Services used to authenticate privileged users for device management to connect to the management network.