Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-55299 | SRG-APP-000516-NDM-000336 | SV-69545r3_rule | Medium |
Description |
---|
Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With robust centralized management, audit records for administrator account access to the organization's network devices can be more readily analyzed for trends and anomalies. The alternative method of defining administrator accounts on each device exposes the device configuration to remote access authentication attacks and system administrators with multiple authenticators for each network device. |
STIG | Date |
---|---|
Network Device Management Security Requirements Guide | 2018-07-02 |
Check Text ( C-55919r4_chk ) |
---|
Review the network device configuration. Determine if any user access accounts other than the account of last resort are configured locally. User access account roles should also be limited to those needed to configure authentication server services. If any User access accounts other than the account of last resort exist on the device, this is a finding. If authentication services are not configured, this is a finding. |
Fix Text (F-60163r3_fix) |
---|
Remove all local accounts from the network device except for an account of last resort. Configure the device to use an authentication server for user account authentication services (e.g., AAA or LDAP). |