Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000012-NDM-000012 | SRG-NET-000012-NDM-000012 | SRG-NET-000012-NDM-000012_rule | Low |
Description |
---|
Account management by a designated authority ensures access to the network device is being controlled by granting access only to authorized personnel with the necessary privileges. Automatic notification of account termination to organizationally identified individuals will provide the necessary reconciliation that account management procedures are being followed. It is also vital that the termination of accounts is monitored to ensure authorized accounts remain active and available for use when required. Notifying designated system individuals will provide an alert, so the account can be enabled if it had been disabled by mistake. This requirement is applicable to accounts created or maintained using the network device application itself rather than the underlying OS or an authentication server. Accounts created and maintained on an authentication server (e.g., RADIUS, LDAP, or Active Directory) are secured using the applicable security guide or STIG. |
STIG | Date |
---|---|
Network Device Management Security Requirements Guide | 2013-07-30 |
Check Text ( C-SRG-NET-000012-NDM-000012_chk ) |
---|
Verify the list of configured alerts includes a notice for account termination events to organizationally identified individuals. If there is not a viewable, configurable option, request the administrator terminate an account and verify notification is sent to the organizationally identified individuals. If the system is not configured to notify organizationally identified individuals when an account has been terminated, this is a finding. |
Fix Text (F-SRG-NET-000012-NDM-000012_fix) |
---|
Configure the network device to send an alert to organizationally identified individuals when accounts are terminated. |