Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-33920 | SRG-NET-000287-DNS-000160 | SV-44373r1_rule | Medium |
Description |
---|
Inactive user accounts pose a risk to systems and applications. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to the system. Systems need to track periods of user inactivity and disable accounts after an organization defined period of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or will have data compromised. |
STIG | Date |
---|---|
Domain Name System (DNS) Security Requirements Guide | 2012-10-24 |
Check Text ( C-41929r1_chk ) |
---|
Review all accounts and verify any accounts that have been inactive or expired for longer than the organization defined time period are authorized to remain. If inactive or expired accounts are present and not authorized to remain, this is a finding. The account management functions will be performed by the name server application if the capability exists. If the capability does not exist the underlying platform's account management system may be used. |
Fix Text (F-37833r1_fix) |
---|
Configure the DNS implementation to disable the user identifiers after an organization defined time period of inactivity. |