UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must map the authenticated identity to the user account for PKI-based authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34683 SRG-NET-000166-IDPS-00124 SV-45562r1_rule Medium
Description
Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account must be bound to a user certificate when PKI-based authentication is implemented. This control applies to accounts configured or controlled by the IDPS itself.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42912r1_chk )
If authentication functionality is provided by the underlying platform's account management system or by a network authentication server rather than the IDPS application itself, this is not a finding.

Inspect the user function of the device to view the PKI configuration.
Verify each account is mapped to the user's PKI certificate.

If the local accounts are not mapped to the user's PKI certificate, this is a finding.
Fix Text (F-38959r1_fix)
Configure each local account to map the PKI certificate for each local user to the user's account.