Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-62839 | RICX-DM-000007 | SV-77329r1_rule | Low |
Description |
---|
Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. Notification of account creation helps to mitigate this risk. Auditing account creation provides the necessary reconciliation that account management procedures are being followed. Without this audit trail, personnel without the proper authorization may gain access to critical network nodes. |
STIG | Date |
---|---|
Riverbed SteelHead CX v8 NDM Security Technical Implementation Guide | 2019-10-01 |
Check Text ( C-63633r1_chk ) |
---|
Verify that RiOS is configured to generate a log event for account creation events. Create an account Navigate to the device Management Console, then Navigate to: Reports >> Diagnostics >> System Logs Enter the account name into the filter and click Go Delete the account that was created If no event record for the user creation action exists in the event log, this is a finding. |
Fix Text (F-68757r1_fix) |
---|
Configure RiOS to generate a log event for account creation events. Navigate to the device Management Console, then Navigate to: Configure >> System Settings >> Logging Under Configuration, set minimum severity to Info |