Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34469 | SRG-NET-000008-IDPS-00008 | SV-45195r1_rule | Low |
Description |
---|
Because the accounts used to access the IDPS components are privileged or system level accounts, account management is vital to the security of the system. In order to respond to events affecting user accessibility and IDPS service processing, the system must audit account modification and, when required, notify the appropriate individuals, so they can investigate the event to ensure its validity. Such a capability greatly reduces the risk of unauthorized access to the system and provides logging that can be used for forensic purposes. This requirement is applicable for accounts created or maintained using the IDPS application itself rather than the underlying OS or an authentication server. Accounts created and maintained on AAA devices (e.g., RADIUS, LDAP, or Active Directory) are secured using the applicable security guide or STIG. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-42542r1_chk ) |
---|
Verify the list of configured alerts includes a notice for account modification, such as changes to access or privileges. If there is not a viewable, configurable option, request the administrator modify an account and validate that notification is sent to the appropriate individuals. If the system is not configured to notify the appropriate individuals when accounts are modified, this is a finding. |
Fix Text (F-38590r1_fix) |
---|
Configure the device to notify appropriate individuals (e.g., designated system administrators and/or account holder) when any modification is made to the account (e.g., changes to account privileges). |