UCF STIG Viewer Logo

For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account modification events.


Overview

Finding ID Version Rule ID IA Controls Severity
V-223182 JUSX-DM-000016 SV-223182r513241_rule Medium
Description
Upon gaining access to a network device, an attacker will often first attempt to modify existing accounts to increase/decrease privileges. Notification of account modification events help to mitigate this risk. Auditing account modification events provides the necessary reconciliation that account management procedures are being followed. Without this audit trail, personnel without the proper authorization may gain access to critical network nodes. An AAA server is required for account management in accordance with CCI-000370. Only a single account of last resort is permitted on the local device. However, since it is still possible for administrators to create local accounts either maliciously or to support mission needs, the SRX must be configured to log account management events. To log local account management events, ensure at least one external syslog server is configured to log facility any or facility change-log, and severity info or severity any.
STIG Date
Juniper SRX SG NDM Security Technical Implementation Guide 2021-03-25

Details

Check Text ( C-24855r513239_chk )
Verify the device logs change-log events of severity info or any to an external syslog server.

[edit]
show system syslog

host {
any ;
source-address ;
}

-OR-

host {
change-log ;
source-address ;
}

If an external syslog host is not configured to log facility change-log severity , or configured for facility any severity , this is a finding.
Fix Text (F-24843r513240_fix)
Configure at least one external syslog host is configured to log facility change-log or any, and severity info or any.

[edit system syslog]
set host any

-OR-

[edit]
set host change-log