From Network Device Management Security Requirements Guide
Part of SRG-APP-000025-NDM-000207
Associated with: CCI-000017
Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security of the network device. Inactive accounts could be reactivated or compromised by unauthorized users, allowing exploitation of vulnerabilities and undetected access to the network device.
Determine if the network device disables account after 35 days of inactivity for all local accounts except for the account of last resort or root account. For non-local accounts, verify that the device is configured to use an authentication server. If the network device does not have the capability to automatically disable or remove accounts after 35 days of inactivity, this is a finding.
Configure the network device to automatically disable accounts after 35 days of inactivity. Disable or remove unauthorized local accounts, except for the account of last resort and the root account
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer