UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Juniper SRX Services Gateway must implement logon roles to ensure only authorized roles are allowed to install software and updates.


Overview

Finding ID Version Rule ID IA Controls Severity
V-223202 JUSX-DM-000077 SV-223202r513295_rule Medium
Description
Allowing anyone to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. This requirement applies to code changes and upgrades for all network devices. For example audit admins and the account of last resort are not allowed to perform this task.
STIG Date
Juniper SRX SG NDM Security Technical Implementation Guide 2021-03-25

Details

Check Text ( C-24875r513293_chk )
To verify role-based access control has been configured, view the settings for each login class defined.

[edit]
show system login

View all login classes to see which roles are assigned the "Maintenance" or "request system software add" permissions.

If login classes for user roles that are not authorized to install and update software are configured, this is a finding.
Fix Text (F-24863r513294_fix)
Configure the Juniper SRX to allow only the ISSM user account (or administrators/roles appointed by the ISSM) to select which auditable events are to be audited. To ensure this is the case, each ISSM-appointed role on the AAA must be configured for least privilege using the following stanzas for each role.

[edit]
show system login

Use the delete command or retype the command to remove the permission "Maintenance" or "request system software add" from any class that is not authorized to upgrade software on the device. An explicitly Deny for the command "request system software add" can also be used if some Maintenance commands are permitted.