UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The firewall implementation must automatically audit the creation of accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000005-FW-000005 SRG-NET-000005-FW-000005 SRG-NET-000005-FW-000005_rule Low
Description
Upon gaining access to a system, an attacker will often first attempt to create a persistent method of re-establishing access. One way to accomplish this is to create a new account. Notification of account creation helps to mitigate this risk. Auditing account creation provides the necessary reconciliation that account management procedures are being followed. Without this audit trail, personnel without the proper security clearance may gain access to critical network nodes. This requirement is applicable to accounts created using the firewall application itself rather than the underlying OS or an authentication server. Accounts created and maintained on AAA devices (e.g., RADIUS, LDAP, or Active Directory) are secured using the applicable security guide or STIG.
STIG Date
Firewall Security Requirements Guide 2012-12-10

Details

Check Text ( C-SRG-NET-000005-FW-000005_chk )
Review the configuration of the firewall audit log.
Verify the system is configured to log all account creation events.

If account creation events are not logged, this is a finding.
Fix Text (F-SRG-NET-000005-FW-000005_fix)
Configure the firewall implementation to automatically audit the creation of accounts.