UCF STIG Viewer Logo

The firewall implementation must implement separation of duties through assigned information system access authorizations.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37075 SRG-NET-000034-FW-000031 SV-48836r1_rule Low
Description
Separation of duties supports the management of individual accountability and reduces the power of one individual or administrative account. An example of separation of duties within the firewall implementation is to allow only the firewall administrator to manage the firewall platform and associated configuration files, yet not be a member of the "auditors" group. Employing a separation of duties model reduces the threat of one individual having the authority to make changes to a system, and the authority to delete any record of those changes. By not restricting system administrators to their proper privilege levels, access to restricted and advanced functions may be provided to system administrators not authorized or trained to use those functions. For example, groups may be defined such as auditors, backup operators, and firewall administrators. Access authorizations may also be associated with individual operational commands.
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45448r1_chk )
Review the firewall configuration to verify the system is configured to assign administrator privileges based on assigned duties, with only the permissions required to support their role.


If accounts are not assigned privileges based on assigned duties and authorizations, this is a finding.
Fix Text (F-42021r1_fix)
Configure the firewall implementation to use the separation of duties model and require separate accounts based on the minimum privileges needed to perform the required function.