Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-14723 | NET0445 | SV-15473r2_rule | Medium |
Description |
---|
Without secure management implemented with authenticated access controls, strong two-factor authentication, encryption of the management session and audit logs, unauthorized users may gain access to network managed devices compromised, large parts of the network could be incapacitated with only a few commands. |
STIG | Date |
---|---|
Network Infrastructure Policy Security Technical Implementation Guide | 2016-12-22 |
Check Text ( C-12939r2_chk ) |
---|
Review all network element configurations to ensure that an authentication server is being used. Then verify that a two-factor authentication method has been implemented. The RADIUS or TACACS server referenced in the configurations will call a two-factor authentication server. If two-factor authentication is not being used to access all network elements, this is a finding. |
Fix Text (F-14190r2_fix) |
---|
The network administrator must ensure strong two-factor authentication is being incorporated in the access scheme. |