Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000143-IDPS-000133 | SRG-NET-000143-IDPS-000133 | SRG-NET-000143-IDPS-000133_rule | Medium |
Description |
---|
To assure individual accountability and prevent unauthorized access, organizational users shall be individually identified and authenticated. Sharing group accounts on any device is prohibited. If group accounts are not changed when individuals leave the group, that person could gain control of the network device. However, there are times when they are deemed mission essential. The security architecture of the IDPS and any installed applications must allow use of an individual authenticator (e.g., AAA server or Active Directory authentication) prior to using individual authentications. |
STIG | Date |
---|---|
IDPS Security Requirements Guide (SRG) | 2012-03-08 |
Check Text ( C-43268_chk ) |
---|
Ask if group accounts are used to access or operate (use installed applications). Observe several administrators logging in and note the process for using group accounts. If group accounts are used without first logging in with individual credentials, this is a finding. |
Fix Text (F-43268_fix) |
---|
Configure the system to require individual credentials for each user. Verify group authenticators are mission essential or necessary for the operation of the system. |