Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
WN12-00-000012 | WN12-00-000012 | WN12-00-000012_rule | Medium |
Description |
---|
Shared accounts (accounts where two or more people log in with the same user identification) do not provide adequate identification and authentication. There is no way to provide for nonrepudiation or individual accountability for system access and resource usage. Documentation must include a list of personnel that have access to each shared account. |
STIG | Date |
---|---|
Microsoft Windows Server 2012 Domain Controller Security Technical Implementation Guide | 2013-07-25 |
Check Text ( C-WN12-00-000012_chk ) |
---|
Determine whether any shared accounts exist. If no shared accounts exist, this is NA. Any shared account must be documented with the IAO. Documentation must include the reason for the account, who has access to this account, and how the risk of using a shared account (which provides no individual identification and accountability) is mitigated. If such documentation does not exist, or is not current, this is a finding. Note: As an example, a shared account may be permitted for a help desk or a site security personnel machine, if that machine is stand-alone and has no access to the network. |
Fix Text (F-WN12-00-000012_fix) |
---|
Create or update shared account documentation that minimally contains the name of the shared accounts, the systems on which the accounts exist, and the individuals who have access to the accounts. Remove any shared accounts that do not meet the requirements. |