UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must be compliant with at least one IETF Internet standard authentication protocol.


Overview

Finding ID Version Rule ID IA Controls Severity
V-55211 SRG-APP-000325-NDM-000285 SV-69457r2_rule Medium
Description
Protecting access authorization information (i.e., access control decisions) ensures that authorization information cannot be altered, spoofed, or otherwise compromised during transmission. In distributed information systems, authorization processes and access control decisions may occur in separate parts of the systems. In such instances, authorization information is transmitted securely so timely access control decisions can be enforced at the appropriate locations. To support the access control decisions, it may be necessary to transmit, as part of the access authorization information, supporting security attributes. This is because, in distributed information systems, there are various access control decisions that need to be made, and different entities (e.g., services) make these decisions in a serial fashion, each requiring some security attributes to make the decisions. The network device must be compliant with at least one IETF standard authentication protocol such as Remote Authentication Dial-In User Service (RADIUS), Extensible Authentication Protocol (EAP), Lightweight Directory Access Protocol (LDAP), and Terminal Access Controller Access-Control System Plus (TACACS+). Protocols that are clearly defined in IETF RFC Internet standards (a.k.a. full standards), and are capable of securely conveying authorization information, are suitable for use.
STIG Date
Network Device Management Security Requirements Guide 2017-12-28

Details

Check Text ( C-55829r2_chk )
Review the device configuration to determine if it uses an IETF Internet standard authentication protocol. Examples include RADIUS, EAP, LDAP, and TACACS+. If it is not configured to use an IETF Internet standard authentication protocol, this is a finding.
Fix Text (F-60073r2_fix)
Configure the network device to use an IETF Internet standard authentication protocol.