UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000169-NDM-NA SRG-NET-000169-NDM-NA SRG-NET-000169-NDM-NA_rule Low
Description
Non-organizational users will be uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization when related to the use of anonymous access. Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organizations security policy. Access to the network must be categorized as administrator, user, or guest, so the appropriate authorization can be assigned to the user requesting access to the network or a network device. Authorization requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of user identities is accomplished through the use of passwords, tokens, biometrics, or in the case of multifactor authentication, some combination thereof. Lack of authentication enables anyone to gain access to the network or possibly a network device that provides opportunity for intruders to compromise resources within the network infrastructure. By identifying and authenticating non-organizational users, their access to network resources can be restricted accordingly. Non-organizational users are not allowed user accounts on the network device; therefore, this requirement is not applicable.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000169-NDM-NA_chk )
This requirement is NA for network device management.
Fix Text (F-SRG-NET-000169-NDM-NA_fix)
This requirement is NA for network device management.