UCF STIG Viewer Logo

The network device must automatically audit the creation of accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000005-NDM-000005 SRG-NET-000005-NDM-000005 SRG-NET-000005-NDM-000005_rule Low
Description
Upon gaining access to a system, an attacker will often first attempt to create a persistent method of re-establishing access. One way to accomplish this is to create a new account. Notification of account creation helps to mitigate this risk. Auditing account creation provides the necessary reconciliation that account management procedures are being followed. Without this audit trail, personnel without the proper security clearance may gain access to critical network nodes. This requirement is applicable to accounts created using the network device application itself rather than the underlying OS or an authentication server. Accounts created and maintained on an authentication server (e.g., RADIUS, LDAP, or Active Directory) are secured using the applicable security guide or STIG.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000005-NDM-000005_chk )
Review the configuration of the network device audit log.
Verify the system is configured to log all account creation events.

If account creation events are not logged, this is a finding.
Fix Text (F-SRG-NET-000005-NDM-000005_fix)
Configure the network device to automatically audit the creation of accounts.