UCF STIG Viewer Logo

The DNS implementation must support organizational requirements to disable the user identifiers after an organization defined time period of inactivity.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33920 SRG-NET-000287-DNS-000160 SV-44373r1_rule Medium
Description
Inactive user accounts pose a risk to systems and applications. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to the system. Systems need to track periods of user inactivity and disable accounts after an organization defined period of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or will have data compromised.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2012-10-24

Details

Check Text ( C-41929r1_chk )
Review all accounts and verify any accounts that have been inactive or expired for longer than the organization defined time period are authorized to remain. If inactive or expired accounts are present and not authorized to remain, this is a finding.

The account management functions will be performed by the name server application if the capability exists. If the capability does not exist the underlying platform's account management system may be used.
Fix Text (F-37833r1_fix)
Configure the DNS implementation to disable the user identifiers after an organization defined time period of inactivity.