UCF STIG Viewer Logo

The Juniper SRX Services Gateway must generate an immediate alert message to the management console for account enabling actions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-229019 JUSX-DM-000024 SV-229019r518235_rule Medium
Description
In order to detect and respond to events that affect network administrator accessibility and device processing, network devices must audit account enabling actions and, as required, notify the appropriate individuals so they can investigate the event. Alerts must be sent immediately to the designated individuals (e.g., via Syslog configuration, SNMP trap, manned console message, or other events monitoring system). Accounts can be disabled by configuring the account with the built-in login class "unauthorized". When the command is reissued with a different login class, the account is enabled.
STIG Date
Juniper SRX SG NDM Security Technical Implementation Guide 2021-03-25

Details

Check Text ( C-31334r518233_chk )
Verify the device is configured to display change-log events of severity info.

[edit]
show system syslog

If the system is not configured to display account enabling actions on the management console, this is a finding.
Fix Text (F-31311r518234_fix)
The following commands configure the device to immediately display a message to any currently logged on administrator's console when changes are made to the configuration. This is an example method. Alerts must be sent immediately to the designated individuals (e.g., via Syslog configuration, SNMP trap, manned console message, or other events monitoring system).

[edit]
set system syslog users * change-log