Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-3056 | NET0460 | SV-3056r7_rule | IAIA-1 IAIA-2 | High |
Description |
---|
Group accounts configured for use on a network device do not allow for accountability or repudiation of individuals using the shared account. If group accounts are not changed when someone leaves the group, that person could possibly gain control of the network device. Having group accounts does not allow for proper auditing of who is accessing or changing the network. |
STIG | Date |
---|---|
Perimeter L3 Switch Security Technical Implementation Guide - Cisco | 2015-04-06 |
Check Text ( C-3503r11_chk ) |
---|
Review the network device configuration and validate there are no group accounts configured for access. If a group account is configured on the device, this is a finding. |
Fix Text (F-3081r9_fix) |
---|
Configure individual user accounts for each authorized person then remove any group accounts. |