UCF STIG Viewer Logo

The network device must enforce access restrictions associated with changes to the system components.


Overview

Finding ID Version Rule ID IA Controls Severity
V-202131 SRG-APP-000516-NDM-000335 SV-202131r401224_rule Medium
Description
Changes to the hardware or software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network device for implementing any changes or upgrades. This requirement applies to updates of the application files, configuration, ACLs, and policy filters.
STIG Date
Network Device Management Security Requirements Guide 2021-03-16

Details

Check Text ( C-2257r382067_chk )
Check the network device to determine if only authorized administrators have permissions for changes, deletions and updates on the network device. Inspect the maintenance log to verify changes are being made only by the system administrators.

If unauthorized users are allowed to change the hardware or software, this is a finding.
Fix Text (F-2258r382068_fix)
Configure the network device to enforce access restrictions associated with changes to the system components.