UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DataPower Gateway must employ automated mechanisms to centrally verify authentication settings.


Overview

Finding ID Version Rule ID IA Controls Severity
V-65181 WSDP-NM-000136 SV-79671r1_rule Medium
Description
The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible. Without centralized management, it is likely that credentials for some network devices will be forgotten, leading to delays in administration, which itself leads to delays in remediating production problems and in addressing compromises in a timely fashion.
STIG Date
IBM DataPower Network Device Management Security Technical Implementation Guide 2017-10-05

Details

Check Text ( C-65809r1_chk )
Go to Administration >> Access >> RBM Settings. Verify Authentication Method is LDAP. If it is not, this is a finding.
Fix Text (F-71121r1_fix)
Go to Administration >> Access >> RBM Settings. Set Authentication Method to LDAP.

Configure LDAP connection as needed. The connection will be verified.