UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The BIG-IP appliance must only store encrypted representations of passwords.


Overview

Finding ID Version Rule ID IA Controls Severity
V-60157 F5BI-DM-000121 SV-74587r1_rule Medium
Description
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. Network devices must enforce password encryption using an approved cryptographic hash function, when storing passwords.
STIG Date
F5 BIG-IP Device Management 11.x Security Technical Implementation Guide 2019-12-20

Details

Check Text ( C-61011r1_chk )
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces password encryption for storage.

Navigate to the BIG-IP System manager >> System >> Users >> Authentication.

Verify "Authentication: User Directory" is configured for an approved remote authentication server that only stores encrypted representations of passwords.

If the BIG-IP appliance is not configured to use a properly configured authentication server that stores encrypted representations of passwords, this is a finding.
Fix Text (F-65745r1_fix)
Configure the BIG-IP appliance to use a properly configured authentication server that only stores encrypted representations of passwords.