UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Shared user accounts will not be permitted on the system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1072 1.008 SV-32241r1_rule IAGA-1 Medium
Description
Shared accounts do not provide individual accountability for system access and resource usage.
STIG Date
Windows Server 2008 R2 Domain Controller Security Technical Implementation Guide 2012-09-05

Details

Check Text ( C-32873r1_chk )
Interview the SA to determine if any shared accounts exist.

Any shared account must be documented with the IAO. Documentation should include the reason for the account, who has access to this account, and how the risk of using a shared account (which provides no individual identification and accountability) is mitigated.

As an example, a shared account may be permitted for a help desk or a site security personnel machine, if that machine is stand-alone and has no access to the network.

Fix Text (F-33r1_fix)
Remove any shared accounts that do not meet the exception requirements listed.