From Authentication, Authorization, and Accounting Services (AAA) Security Requirements Guide
Part of SRG-APP-000320-AAA-000180
Associated with: CCI-002132
Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply enable a new or disabled account. Sending notification of account enabling events to the system administrator and ISSO is one method for mitigating this risk. Such a capability greatly reduces the risk that application accessibility will be negatively affected for extended periods of time and provides logging that can be used for forensic purposes.
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify system administrator and ISSO of account enabling actions. If AAA Services are not configured to notify the system administrator and ISSO of account enabling actions, this is a finding.
Configure AAA Services to notify system administrator and ISSO of account enabling actions.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer