UCF STIG Viewer Logo

The network element must enforce the identification and authentication of all organizational users.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34632 SRG-NET-000138-IDPS-NA SV-45507r1_rule Low
Description
Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organization’s security policy. Access to the network must be categorized as administrator, user, or guest so the appropriate authorization can be assigned to the user requesting access to the network or IDPS. Authorization requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of user identities is accomplished through the use of passwords, tokens, biometrics, or in the case of multifactor authentication, some combination thereof. Lack of authentication enables anyone to gain access to the network or possibly an IDPS providing opportunity for intruders to compromise resources within the network infrastructure. The IDPS does not enforce identification and authentication of all organizational users. Non-privileged users are not authorized to authenticate to the sensors or management consoles.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42856r1_chk )
This requirement is NA for IDPS. No fix required.
Fix Text (F-38904r1_fix)
This requirement is NA for IDPS. No fix required.