UCF STIG Viewer Logo

The Palo Alto Networks security platform must prohibit the use of unencrypted protocols for network access to privileged accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-228655 PANW-NM-000061 SV-228655r513570_rule Medium
Description
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. Network devices can accomplish this by making direct function calls to encryption modules or by leveraging operating system encryption capabilities.
STIG Date
Palo Alto Networks NDM Security Technical Implementation Guide 2022-09-14

Details

Check Text ( C-30890r513568_chk )
Go to Device >> Setup >> Management
View the "Management Interface Settings" pane.
If either Telnet or HTTP is listed in the "Services" field, this is a finding.
Fix Text (F-30867r513569_fix)
Go to Device >> Setup >> Management
In the "Management Interface Settings" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane). In the "Management Interface Settings" window, make sure that HTTP and Telnet are not checked (enabled).
If they are not checked, select either "OK" or "Cancel".
If either one is checked, select the check box to disable it, then select "OK".
If any changes were made, commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.