Emergency accounts are established in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency accounts are not to be confused with infrequently used accounts (e.g., local login accounts used when network resources are unavailable). Such accounts remain available and are not subject to automatic termination dates.
If these accounts remain active when no longer needed, they may be used to gain unauthorized access. The risk is greater for the network device since these accounts have elevated privileges. To mitigate this risk, automated termination of all emergency accounts must be set upon account creation.
This control does not include emergency administration accounts which are meant for access to the network device components in case of network failure. These accounts must not be automatically disabled. This requirement is applicable to emergency accounts created or managed using the network device application itself rather than the underlying OS or an authentication server. Accounts created and maintained on an authentication server (e.g., RADIUS, LDAP, or Active Directory) are secured using the applicable security guide or STIG. |