Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-62845 | RICX-DM-000010 | SV-77335r1_rule | Low |
Description |
---|
Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will support account management procedures. When device management accounts are terminated, user or service accessibility may be affected. Auditing also ensures authorized active accounts remain enabled and available for use when required. |
STIG | Date |
---|---|
Riverbed SteelHead CX v8 NDM Security Technical Implementation Guide | 2015-11-30 |
Check Text ( C-63639r1_chk ) |
---|
Verify that RiOS is configured to generate a log event for account creation events. Create an account To disable an account Navigate to the device Management Console, then Navigate to: Configure >> Security >> User >> Permissions Select the account to be removed Click Remove Selected Account Navigate to the device Management Console, then Navigate to: Reports >> Diagnostics >> System Logs Enter the account name into the filter and click "Go" Delete the account that was created. If no event record for the user removal action exists in the event log, this is a finding. |
Fix Text (F-68763r1_fix) |
---|
Configure RiOS to generate a log event for account disabling actions. Navigate to the device Management Console, then Navigate to: Configure >> System Settings >> Logging Under Configuration, set minimum severity to Info Click "Save" Under Configuration, set minimum severity to Info. |