From Network Device Management Security Requirements Guide
Part of SRG-APP-000516-NDM-000336
Associated with: CCI-000366 CCI-000370
Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With robust centralized management, audit records for administrator account access to the organization's network devices can be more readily analyzed for trends and anomalies. The alternative method of defining administrator accounts on each device exposes the device configuration to remote access authentication attacks and system administrators with multiple authenticators for each network device.
Review the network device configuration. Determine if any user access accounts other than the account of last resort are configured locally. User access account roles should also be limited to those needed to configure authentication server services. If any User access accounts other than the account of last resort exist on the device, this is a finding. If authentication services are not configured, this is a finding.
Remove all local accounts from the network device except for an account of last resort. Configure the device to use an authentication server for user account authentication services (e.g., AAA or LDAP).
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer