Account management functions include: assignment of group or role membership; identifying account type; specifying user access authorizations (i.e., privileges); account removal, update, or termination; and administrative alerts. The firewall implementation must be configured to automatically provide account management functions and these functions must immediately enforce the organization's current account policy.
All accounts used for access to the firewall are privileged or system level accounts. Therefore, if account management functions are not automatically enforced, an attacker could gain privileged access to a vital element of the network security architecture.
This control does not include infrequently used accounts which provide emergency access to the firewall components in case of network failure. There must be only one such locally defined account.
All other accounts must be defined. All other accounts must be created and managed on the site's authentication server (e.g., AAA server such as RADIUS, LDAP, or Active Directory). This requirement is applicable to account management functions provided by the firewall application. If the function is provided by the underlying OS or an authentication server, it must be secured using the applicable security guide or STIG. |