UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Accounts for device management must be configured on the authentication server and not the network device itself, except for the account of last resort.


Overview

Finding ID Version Rule ID IA Controls Severity
V-55299 SRG-APP-000516-NDM-000336 SV-69545r3_rule Medium
Description
Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With robust centralized management, audit records for administrator account access to the organization's network devices can be more readily analyzed for trends and anomalies. The alternative method of defining administrator accounts on each device exposes the device configuration to remote access authentication attacks and system administrators with multiple authenticators for each network device.
STIG Date
Network Device Management Security Requirements Guide 2016-09-30

Details

Check Text ( C-55919r4_chk )
Review the network device configuration. Determine if any user access accounts other than the account of last resort are configured locally. User access account roles should also be limited to those needed to configure authentication server services.

If any User access accounts other than the account of last resort exist on the device, this is a finding.

If authentication services are not configured, this is a finding.
Fix Text (F-60163r3_fix)
Remove all local accounts from the network device except for an account of last resort. Configure the device to use an authentication server for user account authentication services (e.g., AAA or LDAP).