Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000013-FW-000013 | SRG-NET-000013-FW-000013 | SRG-NET-000013-FW-000013_rule | Low |
Description |
---|
Atypical account usage is behavior that is not part of normal usage cycles (e.g., large amounts of user account activity occurring after hours or on weekends). A comprehensive account management process will establish an audit trail to documents the use of application user accounts. It also ensures administrators and application owners are notified of atypical account usage. Such a process greatly reduces the risk that compromised user accounts will continue to be used by unauthorized persons and provides logging that can be used for forensic purposes. This requirement can be accomplished by generating log records when an account is used; as well as by generating an alert if the usage threshold within a time period is exceeded. Security for the operating system or authentication server accounts is beyond the scope of this security guide. This requirement applies to accounts created and managed on or by the network device. |
STIG | Date |
---|---|
Firewall Security Requirements Guide | 2012-12-10 |
Check Text ( C-SRG-NET-000013-FW-000013_chk ) |
---|
Review the firewall audit configuration to determine if an audit log entry is generated that includes account usage information. If the firewall audit configuration parameters are set to log values outside of normal usage, as determined by the configuration management plan, this is a finding. |
Fix Text (F-SRG-NET-000013-FW-000013_fix) |
---|
Configure the firewall implementation to monitor for unusual usage of firewall accounts. |