Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-229019 | JUSX-DM-000024 | SV-229019r961863_rule | Medium |
Description |
---|
In order to detect and respond to events that affect network administrator accessibility and device processing, network devices must audit account enabling actions and, as required, notify the appropriate individuals so they can investigate the event. Alerts must be sent immediately to the designated individuals (e.g., via Syslog configuration, SNMP trap, manned console message, or other events monitoring system). Accounts can be disabled by configuring the account with the built-in login class "unauthorized". When the command is reissued with a different login class, the account is enabled. |
STIG | Date |
---|---|
Juniper SRX SG NDM Security Technical Implementation Guide | 2024-06-10 |
Check Text ( C-31334r518233_chk ) |
---|
Verify the device is configured to display change-log events of severity info. [edit] show system syslog If the system is not configured to display account enabling actions on the management console, this is a finding. |
Fix Text (F-31311r518234_fix) |
---|
The following commands configure the device to immediately display a message to any currently logged on administrator's console when changes are made to the configuration. This is an example method. Alerts must be sent immediately to the designated individuals (e.g., via Syslog configuration, SNMP trap, manned console message, or other events monitoring system). [edit] set system syslog users * change-log |