UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

CounterACT appliances performing maintenance functions must restrict use of these functions to authorized personal only.


Overview

Finding ID Version Rule ID IA Controls Severity
V-76219 CACT-NM-000041 SV-90907r1_rule High
Description
There are security-related issues arising from software brought into the network device specifically for diagnostic and repair actions (e.g., a software packet sniffer installed on a device to troubleshoot system traffic or a vendor installing or running a diagnostic application to troubleshoot an issue with a vendor-supported device). If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the system. This requirement addresses security-related issues associated with maintenance tools used specifically for diagnostic and repair actions on organizational network devices. Maintenance tools can include hardware, software, and firmware items. Maintenance tools are potential vehicles for transporting malicious code, either intentionally or unintentionally, into a facility and subsequently into organizational information systems. Maintenance tools can include, for example, hardware/software diagnostic test equipment and hardware/software packet sniffers. This requirement does not cover hardware/software components that may support information system maintenance yet are a part of the system (e.g., the software implementing "ping," "ls," "ipconfig," or the hardware and software implementing the monitoring port of an Ethernet switch).
STIG Date
ForeScout CounterACT NDM Security Technical Implementation Guide 2017-09-19

Details

Check Text ( C-75905r1_chk )
Determine if the network device restricts the use of maintenance functions to authorized personnel only. View the list of users defined on the device.

Select Tools >> Options >> Console User Profiles.

If other personnel can use maintenance functions on the network device, this is a finding.
Fix Text (F-82855r1_fix)
Configure the access privileges to CounterACT to restrict use of maintenance functions to authorized personnel only.

1. Select Tools >> Options >> Console User Profiles.
2. Adjust or remove the unauthorized group or user profile.

Note: The RAFACS must also be inspected for unauthorized users.