UCF STIG Viewer Logo

The network device must notify the appropriate individuals when accounts are created.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000006-NDM-000006 SRG-NET-000006-NDM-000006 SRG-NET-000006-NDM-000006_rule Low
Description
Because the accounts used to access the network device components are privileged or system level accounts, account management is vital to the security of the system. In order to detect and respond to events affecting user accessibility and network device service processing, the system must audit account creation and, when required, notify the organizationally identified individuals, so they can investigate the event to ensure its validity. Such a capability greatly reduces the risk of unauthorized access to the system and provides logging that can be used for forensic purposes. This requirement is applicable to accounts created or maintained using the network device application itself rather than the underlying OS or an authentication server. Accounts created and maintained on an authentication server (e.g., RADIUS, LDAP, or Active Directory) are secured using the applicable security guide or STIG.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000006-NDM-000006_chk )
Verify the list of configured alerts includes a notice for account creation.
Verify the notice is sent to organizationally identified individuals.
If there is not a viewable configurable option, request the administrator create an account and validate that notifications are sent to the organizationally identified individuals.

If the system is not configured to notify the organizationally identified individuals when accounts are created, this is a finding.
Fix Text (F-SRG-NET-000006-NDM-000006_fix)
Configure the network device to send a notification message to organizationally identified individuals (e.g., designated system administrators and/or account holder) when accounts are created.