UCF STIG Viewer Logo

Group accounts must not be configured or used for administrative access.


Finding ID Version Rule ID IA Controls Severity
V-3056 NET0460 SV-3056r4_rule IAIA-1 IAIA-2 High
Group accounts on any device are strictly prohibited. If these group accounts are not changed when someone leaves the group, that person could possibly gain control of the network device. Having group accounts does not allow for proper auditing of who is accessing or changing the network.
Free Space Optics Device Security Technical Implementation Guide (STIG) 2013-03-14


Check Text ( C-3503r8_chk )
Review the network device configuration and validate there are no group accounts configured for administrative access.
Fix Text (F-3081r7_fix)
Configure individual user accounts for each authorized administrator then remove or disable any group accounts with administrative access.