AAA Services Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000023-AAA-000030
- Vuln IDs
-
- V-204636
- V-80819
- Rule IDs
-
- SV-204636r960768_rule
- SV-95529
Checks: C-4759r389189_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to provide automated account management functions. Automated functions include disabling accounts after specified periods of inactivity, locking accounts after a specified number of incorrect logon attempts, etc. Where possible, automated functions must be performed on users and devices globally rather than by each individual account. If AAA Services do not provide automated account management functions, this is a finding.
Fix: F-4759r389190_fix
Configure AAA Services to provide automated account management functions. Automated functions include disabling accounts after specified periods of inactivity, locking accounts after a specified number of incorrect logon attempts, etc. Where possible, automated functions must be performed on users and devices globally rather than by each individual account.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-AAA-000040
- Vuln IDs
-
- V-204637
- V-80951
- Rule IDs
-
- SV-204637r960771_rule
- SV-95661
Checks: C-4760r389192_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically remove temporary user accounts after 72 hours. If the AAA Services configuration does not automatically remove temporary user accounts after 72 hours, this is a finding.
Fix: F-4760r389193_fix
Configure AAA Services to automatically remove temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-AAA-000050
- Vuln IDs
-
- V-204638
- V-80821
- Rule IDs
-
- SV-204638r960771_rule
- SV-95531
Checks: C-4761r389195_chk
If AAA Services do not provide authorizations based on external directory services, this is not applicable. Verify AAA Services are configured to automatically remove authorizations for temporary user accounts after 72 hours. If the AAA Services configuration does not automatically remove authorizations for temporary user accounts after 72 hours, this is a finding.
Fix: F-4761r389196_fix
Configure AAA Services to automatically remove authorizations for temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- SRG-APP-000025-AAA-000080
- Vuln IDs
-
- V-204639
- V-80827
- Rule IDs
-
- SV-204639r960774_rule
- SV-95537
Checks: C-4762r389198_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically disable accounts after a 35-day period of account inactivity. If the AAA Services configuration does not automatically disable accounts after a 35-day period of account inactivity, this is a finding.
Fix: F-4762r389199_fix
Configure AAA Services to automatically disable accounts after a 35-day period of account inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-AAA-000090
- Vuln IDs
-
- V-204640
- V-80829
- Rule IDs
-
- SV-204640r960777_rule
- SV-95539
Checks: C-4763r389201_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically audit account creation. If AAA Services are not configured to automatically audit account creation, this is a finding.
Fix: F-4763r389202_fix
Configure AAA Services to automatically audit account creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-AAA-000100
- Vuln IDs
-
- V-204641
- V-80831
- Rule IDs
-
- SV-204641r960780_rule
- SV-95541
Checks: C-4764r389204_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically audit account modification. If AAA Services are not configured to automatically audit account modification, this is a finding.
Fix: F-4764r389205_fix
Configure AAA Services to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-AAA-000110
- Vuln IDs
-
- V-204642
- V-80833
- Rule IDs
-
- SV-204642r960783_rule
- SV-95543
Checks: C-4765r389207_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically audit account disabling actions. If AAA Services are not configured to automatically audit account disabling actions, this is a finding.
Fix: F-4765r389208_fix
Configure AAA Services to automatically audit account disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-AAA-000120
- Vuln IDs
-
- V-204643
- V-80835
- Rule IDs
-
- SV-204643r960786_rule
- SV-95545
Checks: C-4766r389210_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically audit account removal actions. If AAA Services are not configured to automatically audit account removal actions, this is a finding.
Fix: F-4766r389211_fix
Configure AAA Services to automatically audit account removal actions.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-AAA-000200
- Vuln IDs
-
- V-204644
- V-80851
- Rule IDs
-
- SV-204644r960840_rule
- SV-95561
Checks: C-4767r389213_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically lock user accounts after three consecutive invalid logon attempts within a 15-minute time period. If AAA Services are not configured to automatically lock user accounts after three consecutive invalid logon attempts within a 15-minute time period, this is a finding.
Fix: F-4767r389214_fix
Configure AAA Services to automatically lock user accounts after three consecutive invalid logon attempts within a 15-minute time period.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-AAA-000380
- Vuln IDs
-
- V-204645
- V-80889
- Rule IDs
-
- SV-204645r960879_rule
- SV-95599
Checks: C-4768r389216_chk
Verify AAA Services are configured to audit each authentication and authorization transaction. If AAA Services are not configured to audit each authentication and authorization transaction, this is a finding.
Fix: F-4768r389217_fix
Configure AAA Services to audit each authentication and authorization transaction.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-AAA-000220
- Vuln IDs
-
- V-204646
- V-80857
- Rule IDs
-
- SV-204646r960891_rule
- SV-95567
Checks: C-4769r389219_chk
Verify AAA Services configuration audit records identify what type of events occurred. If AAA Services configuration audit records do not identify what type of events occurred, this is a finding.
Fix: F-4769r389220_fix
Configure AAA Services audit records to identify what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-AAA-000230
- Vuln IDs
-
- V-204647
- V-80859
- Rule IDs
-
- SV-204647r960894_rule
- SV-95569
Checks: C-4770r389222_chk
Verify AAA Services configuration audit records identify the date and time events occurred. If AAA Services configuration audit records do not identify when the events occurred, this is a finding.
Fix: F-4770r389223_fix
Configure AAA Services audit records to identify when the events occurred by specifying the date and time.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-AAA-000240
- Vuln IDs
-
- V-204648
- V-80861
- Rule IDs
-
- SV-204648r960897_rule
- SV-95571
Checks: C-4771r389225_chk
Verify AAA Services configuration audit records identify where the events occurred. If AAA Services configuration audit records do not identify where the events occurred, this is a finding.
Fix: F-4771r389226_fix
Configure AAA Services audit records to identify where the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-AAA-000250
- Vuln IDs
-
- V-204649
- V-80863
- Rule IDs
-
- SV-204649r960900_rule
- SV-95573
Checks: C-4772r389228_chk
Verify AAA Services configuration audit records identify the source of the events. If AAA Services configuration audit records do not identify the source of the events, this is a finding.
Fix: F-4772r389229_fix
Configure AAA Services configuration audit records to identify the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-AAA-000260
- Vuln IDs
-
- V-204650
- V-80865
- Rule IDs
-
- SV-204650r960903_rule
- SV-95575
Checks: C-4773r389231_chk
Verify AAA Services configuration audit records identify the outcome of the events. If AAA Services configuration audit records do not identify the outcome of the events, this is a finding.
Fix: F-4773r389232_fix
Configure AAA Services configuration audit records to identify the outcome of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-AAA-000270
- Vuln IDs
-
- V-204651
- V-80867
- Rule IDs
-
- SV-204651r960906_rule
- SV-95577
Checks: C-4774r389234_chk
Verify AAA Services configuration audit records identify any individual user associated with the event. When a system process rather than an individual user causes the event, the process must be identified in the audit record. If AAA Services configuration audit records do not identify any individual user or process associated with the event, this is a finding.
Fix: F-4774r389235_fix
Configure AAA Services configuration audit records to identify any individual user associated with the event. When events are caused by a system process rather than an individual user, that process must be identified in the audit record.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-AAA-000290
- Vuln IDs
-
- V-204652
- V-80871
- Rule IDs
-
- SV-204652r960912_rule
- SV-95581
Checks: C-4775r389237_chk
Verify AAA Services are configured to alert the SA and ISSO when any audit processing failure occurs. If AAA Services are not configured to alert the SA and ISSO when any audit processing failure occurs, this is a finding.
Fix: F-4775r389238_fix
Configure AAA Services to alert the SA and ISSO when any audit processing failure occurs.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-AAA-000300
- Vuln IDs
-
- V-204653
- V-80873
- Rule IDs
-
- SV-204653r960915_rule
- SV-95583
Checks: C-4776r389240_chk
Verify AAA Services are configured to generate audit records overwriting the oldest audit records in a first-in-first-out manner. When failures are caused by the lack of audit record storage capacity, AAA Services must continue generating audit records. If AAA Services are not configured to generate audit records overwriting the oldest audit records in a first-in-first-out manner, this is a finding.
Fix: F-4776r389241_fix
Configure AAA Services to generate audit records overwriting the oldest audit records in a first-in-first-out manner. Some specific implementations may further require automatically restarting the audit service to synchronize the local audit data with the collection server. The configuration must continue generating audit records, even when failures are caused by the lack of audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-AAA-000310
- Vuln IDs
-
- V-204654
- V-80875
- Rule IDs
-
- SV-204654r960915_rule
- SV-95585
Checks: C-4777r389243_chk
Verify AAA Services are configured to queue audit records locally when any audit processing failure occurs. The queuing must continue until communication is restored or until the audit records are retrieved manually. Some specific implementations may further require automatically restarting the audit service to synchronize the local audit data with the collection server. If AAA Services are not configured to queue audit records locally until communication is restored when any audit processing failure occurs, this is a finding.
Fix: F-4777r389244_fix
Configure AAA Services to queue audit records locally until communication is restored when any audit processing failure occurs. Some specific implementations may further require automatically restarting the audit service to synchronize the local audit data with the collection server. In some cases, AAA Services may require the audit records to be retrieved manually in the event of audit failure.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-AAA-000320
- Vuln IDs
-
- V-204655
- V-80877
- Rule IDs
-
- SV-204655r960927_rule
- SV-95587
Checks: C-4778r389246_chk
Verify AAA Services are configured to use internal system clocks to generate time stamps for audit records. If AAA Services are not configured to use internal system clocks to generate time stamps for audit records, this is a finding.
Fix: F-4778r389247_fix
Configure AAA Services to use internal system clocks to generate time stamps for audit records.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-AAA-000670
- Vuln IDs
-
- V-204656
- V-80945
- Rule IDs
-
- SV-204656r960963_rule
- SV-95655
Checks: C-4779r389249_chk
Determine if AAA Services are configured to disable non-essential modules. If AAA Services are not configured to disable non-essential modules, this is a finding.
Fix: F-4779r389250_fix
Configure AAA Services to disable non-essential modules.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- SRG-APP-000142-AAA-000010
- Vuln IDs
-
- V-204657
- V-80815
- Rule IDs
-
- SV-204657r960966_rule
- SV-95525
Checks: C-4780r389252_chk
If AAA Services do not connect to a directory services or other identity provider, but instead perform user and device account management as part of their functionality, this is not applicable. Review the AAA Services configuration when connecting to directory services or another identity provider. Verify the connection is configured to use secure protocols for transport between AAA Services and the directory services using mutual authentication. The use of LDAP over TLS (LDAPS) is the most common method to secure the directory services or user database traffic. Each protocol egressing the local enclave must be implemented in accordance with its PPSM CAL. If AAA Services do not use secure protocols when connecting to directory services, this is a finding. If the protocols are not implemented in accordance with the PPSM CAL, this is a finding.
Fix: F-4780r389253_fix
Configure AAA Services to use secure protocols when connecting to directory services. The use of LDAP over TLS (LDAPS) is the most common method to secure the directory services or user database traffic. However, proprietary or other protocols may be used in some configurations. Each protocol egressing the local enclave must be implemented in accordance with its PPSM CAL.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- SRG-APP-000142-AAA-000020
- Vuln IDs
-
- V-204658
- V-80817
- Rule IDs
-
- SV-204658r960966_rule
- SV-95527
Checks: C-4781r389255_chk
Verify AAA Services are configured to use protocols that encrypt credentials when authenticating clients. Both the RADIUS and TACACS+ protocols are acceptable when configured to perform encryption. For any protocol implemented, the PPSM CAL and vulnerability assessments must be reviewed to ensure the protocols are properly configured. If AAA Services are not configured to use protocols that encrypt credentials when authenticating clients, as defined in the PPSM CAL and vulnerability assessments, this is a finding.
Fix: F-4781r389256_fix
Configure AAA Services to use protocols that encrypt credentials when authenticating clients. Both the RADIUS and TACACS+ protocols are acceptable when configured to perform encryption. For any protocol implemented, the PPSM CAL and vulnerability assessments must be reviewed to ensure the protocols are properly configured.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-AAA-000680
- Vuln IDs
-
- V-204659
- V-80947
- Rule IDs
-
- SV-204659r960966_rule
- SV-95657
Checks: C-4782r389258_chk
Review the AAA Services configuration to ascertain if it prohibits or restricts the use of organization-defined functions, ports, protocols, and/or services. Further determine if the use is as defined in the PPSM CAL and vulnerability assessments. If AAA Services are not configured in accordance with the PPSM CAL and vulnerability assessments, this is a finding.
Fix: F-4782r389259_fix
Configure AAA Services to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- SRG-APP-000148-AAA-000390
- Vuln IDs
-
- V-204660
- V-80891
- Rule IDs
-
- SV-204660r960969_rule
- SV-95601
Checks: C-4783r389261_chk
Verify AAA Services are configured to uniquely identify and authenticate organizational users. For STIGs produced from this requirement, when AAA Services are used to authenticate processes acting on behalf of organizational users, they also must be uniquely identified and authenticated. If AAA Services are not configured to uniquely identify and authenticate organizational users, this is a finding.
Fix: F-4783r389262_fix
Configure AAA Services to uniquely identify and authenticate organizational users.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-AAA-000400
- Vuln IDs
-
- V-204661
- V-80893
- Rule IDs
-
- SV-204661r960972_rule
- SV-95603
Checks: C-4784r389264_chk
Verify AAA Services are configured to require multifactor authentication using PIV credentials for authenticating privileged user accounts. Although the Common Access Card (CAC) is a PIV credential, it should not be used for privileged accounts, but rather only for non-privileged accounts. Administrative smart cards and tokens, separate from the CAC, are the preferred solution for privileged accounts. If AAA Services are not configured to require multifactor authentication using PIV credentials for authenticating privileged user accounts, this is a finding.
Fix: F-4784r389265_fix
Configure AAA Services to require multifactor authentication using PIV credentials for authenticating privileged user accounts. Although the CAC is a PIV credential, it should not be used for privileged accounts, but rather only for non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000150-AAA-000410
- Vuln IDs
-
- V-204662
- V-80895
- Rule IDs
-
- SV-204662r960975_rule
- SV-95605
Checks: C-4785r389267_chk
Verify AAA Services are configured to require multifactor authentication using CAC PIV credentials for authenticating non-privileged user accounts. If AAA Services are not configured to require multifactor authentication using CAC PIV credentials for authenticating non-privileged user accounts, this is a finding.
Fix: F-4785r389268_fix
Configure AAA Services to require multifactor authentication using CAC PIV credentials for authenticating non-privileged user accounts.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-APP-000158-AAA-000420
- Vuln IDs
-
- V-204663
- V-80897
- Rule IDs
-
- SV-204663r960999_rule
- SV-95607
Checks: C-4786r389270_chk
If AAA Services are not used for 802.1x endpoint identification and authentication, this is not applicable. Verify AAA Services are configured to uniquely identify supplicants before the authenticator establishes any connection. If AAA Services are not configured to uniquely identify supplicants before the authenticator establishes any connection, this is a finding.
Fix: F-4786r389271_fix
Configure AAA Services for 802.1x identification and authentication to uniquely identify supplicants before the authenticator establishes any connection.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000164-AAA-000450
- Vuln IDs
-
- V-204664
- V-80903
- Rule IDs
-
- SV-204664r981554_rule
- SV-95613
Checks: C-4787r389273_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords (to include randomly assigned passwords, shared secrets, and pre-shared keys) are used, verify AAA Services are configured to enforce a minimum 15-character password length. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to enforce a minimum 15-character password length, this is a finding.
Fix: F-4787r389274_fix
Configure AAA Services to enforce a minimum 15-character password length. This includes randomly assigned passwords, shared secrets, and pre-shared keys.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000166-AAA-000460
- Vuln IDs
-
- V-204666
- V-80905
- Rule IDs
-
- SV-204666r981558_rule
- SV-95615
Checks: C-4789r981556_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords (to include randomly assigned passwords, shared secrets, and pre-shared keys) are used, verify AAA Services are configured to enforce password complexity by requiring that at least one uppercase character be used. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to require that at least one uppercase character be used, this is a finding.
Fix: F-4789r981557_fix
Configure AAA Services to enforce password complexity by requiring that at least one uppercase character be used. This includes randomly assigned passwords, shared secrets, and pre-shared keys.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000167-AAA-000470
- Vuln IDs
-
- V-204667
- V-80907
- Rule IDs
-
- SV-204667r981561_rule
- SV-95617
Checks: C-4790r981559_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords (to include randomly assigned passwords, shared secrets, and pre-shared keys) are used, verify AAA Services are configured to enforce password complexity by requiring that at least one lowercase character be used. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to require that at least one lowercase character be used, this is a finding.
Fix: F-4790r981560_fix
Configure AAA Services to enforce password complexity by requiring that at least one lowercase character be used. This includes randomly assigned passwords, shared secrets, and pre-shared keys.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000168-AAA-000480
- Vuln IDs
-
- V-204668
- V-80909
- Rule IDs
-
- SV-204668r981562_rule
- SV-95619
Checks: C-4791r389285_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords (to include randomly assigned passwords, shared secrets, and pre-shared keys) are used, verify AAA Services are configured to enforce password complexity by requiring that at least one numeric character be used. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to require that at least one numeric character be used, this is a finding.
Fix: F-4791r389286_fix
Configure AAA Services to enforce password complexity by requiring that at least one numeric character be used. This includes randomly assigned passwords, shared secrets, and pre-shared keys.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000169-AAA-000490
- Vuln IDs
-
- V-204669
- V-80911
- Rule IDs
-
- SV-204669r981563_rule
- SV-95621
Checks: C-4792r389288_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords (to include randomly assigned passwords, shared secrets, and pre-shared keys) are used, verify AAA Services are configured to enforce password complexity by requiring that at least one special character be used. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to require that at least one special character be used, this is a finding.
Fix: F-4792r389289_fix
Configure AAA Services to enforce password complexity by requiring that at least one special character be used. This includes randomly assigned passwords, shared secrets, and pre-shared keys.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000170-AAA-000500
- Vuln IDs
-
- V-204670
- V-80913
- Rule IDs
-
- SV-204670r981564_rule
- SV-95623
Checks: C-4793r389291_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords are used, verify AAA Services are configured to require the change of at least eight of the total number of characters when passwords are changed. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to require the change of at least eight of the total number of characters when passwords are changed, this is a finding.
Fix: F-4793r389292_fix
Configure AAA Services to require the change of at least eight of the total number of characters when passwords are changed. Note: The best practice would be to require that all characters must be changed with each password change, especially for privileged accounts.
- RMF Control
- Severity
- H
- CCI
- CCI-004062
- Version
- SRG-APP-000171-AAA-000510
- Vuln IDs
-
- V-204671
- V-80953
- Rule IDs
-
- SV-204671r981567_rule
- SV-95663
Checks: C-4794r981565_chk
Where passwords are used, verify AAA Services are configured to encrypt locally stored credentials using a FIPS-validated cryptographic module. AAA Services may leverage the capability of an operating system or purpose-built module for this purpose. Confirm databases, configuration files, and log files have encrypted representations for all passwords, and that no password strings are readable/discernable. Potential locations include the local file system where configurations and events are stored, or in a related database table. Review AAA Services configuration for use of the MD5 algorithm to create password hashes. If AAA Services are not configured to encrypt locally stored credentials using a FIPS-validated cryptographic module, this is a finding. If AAA Services are configured to use MD5 to create password hashes, this is a finding. Note: FIPS-validated cryptographic modules are listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
Fix: F-4794r981566_fix
Configure AAA Services to encrypt locally stored credentials using a FIPS-validated cryptographic module. Configure all associated databases, configuration files, and audit files to use only encrypted representations for all passwords so that no password strings are readable/discernable.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-APP-000172-AAA-000520
- Vuln IDs
-
- V-204672
- V-80915
- Rule IDs
-
- SV-204672r961029_rule
- SV-95625
Checks: C-4795r389297_chk
Where passwords are used, verify AAA Services are configured to encrypt transmitted credentials using a FIPS-validated cryptographic module. AAA Services may leverage the capability of an operating system or purpose-built module for this purpose. If AAA Services are not configured to encrypt transmitted credentials using a FIPS-validated cryptographic module, this is a finding. Note: FIPS-validated cryptographic modules are listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
Fix: F-4795r389298_fix
Configure AAA Services to encrypt transmitted credentials using a FIPS-validated cryptographic module.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000173-AAA-000530
- Vuln IDs
-
- V-204673
- V-80917
- Rule IDs
-
- SV-204673r981570_rule
- SV-95627
Checks: C-4796r981568_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. This requirement is not applicable to service account passwords (e.g., shared secrets, pre-shared keys) or the account of last resort. Where passwords are used, such as temporary or emergency accounts, verify AAA Services are configured to enforce 24 hours as the minimum password lifetime. When the AAA Services configuration setting is for "1 day", it is required that the length be 24 hours. If AAA Services are not configured to enforce 24 hours as the minimum password lifetime, this is a finding.
Fix: F-4796r981569_fix
Configure AAA Services to enforce 24 hours as the minimum password lifetime. When the AAA Services configuration setting is for "1 day", it is required that the length be 24 hours. This requirement is not applicable to service account passwords (e.g., shared secrets, pre-shared keys) or the account of last resort.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000174-AAA-000540
- Vuln IDs
-
- V-204674
- V-80919
- Rule IDs
-
- SV-204674r981571_rule
- SV-95629
Checks: C-4797r389303_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. This requirement is not applicable to service account passwords (e.g. shared secrets, pre-shared keys) or the account of last resort. Where passwords are used, such as temporary or emergency accounts, verify AAA Services are configured to enforce a 60-day maximum password lifetime restriction. Additionally, AAA Services must force password change upon the first logon after the expiration of the 60 days. If AAA Services are not configured to enforce a 60-day maximum password lifetime restriction, this is a finding.
Fix: F-4797r389304_fix
Configure AAA Services to enforce a 60-day maximum password lifetime restriction. Additionally, configure AAA Services to force password change upon the first logon after the expiration of the 60 days. This requirement is not applicable to service account passwords (e.g. shared secrets, pre-shared keys) or the account of last resort.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- SRG-APP-000175-AAA-000570
- Vuln IDs
-
- V-204675
- V-80925
- Rule IDs
-
- SV-204675r961038_rule
- SV-95635
Checks: C-4798r389306_chk
Verify AAA Services are configured to only accept certificates issued by a DoD-approved Certificate Authority for PKI-based authentication. If AAA Services are not configured to only accept certificates issued by a DoD-approved Certificate Authority, this is a finding.
Fix: F-4798r389307_fix
Configure AAA Services to only accept certificates issued by a DoD-approved Certificate Authority for PKI-based authentication.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- SRG-APP-000175-AAA-000580
- Vuln IDs
-
- V-204676
- V-80927
- Rule IDs
-
- SV-204676r961038_rule
- SV-95637
Checks: C-4799r389309_chk
Verify AAA Services are configured to reflect certificates that have been revoked for PKI-based authentication. If AAA Services are not configured to reject certificates that have been revoked, this is a finding.
Fix: F-4799r389310_fix
Configure AAA Services to not accept certificates that have been revoked for PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-AAA-000590
- Vuln IDs
-
- V-204677
- V-80929
- Rule IDs
-
- SV-204677r961041_rule
- SV-95639
Checks: C-4800r389312_chk
Verify AAA Services are configured to enforce authorized access to the corresponding private key for PKI-based authentication. If AAA Services are not configured to enforce authorized access to the corresponding private key, this is a finding.
Fix: F-4800r389313_fix
Configure AAA Services to enforce authorized access to the corresponding private key for PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-AAA-000600
- Vuln IDs
-
- V-204678
- V-80931
- Rule IDs
-
- SV-204678r961044_rule
- SV-95641
Checks: C-4801r389315_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to map the authenticated identity to the user account for PKI-based authentication. If AAA Services are not configured to map the authenticated identity to the user account, this is a finding.
Fix: F-4801r389316_fix
Configure AAA Services to map the authenticated identity to the user account for PKI-based authentication.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-001199
- Version
- SRG-APP-000231-AAA-000610
- Vuln IDs
-
- V-204679
- V-80933
- Rule IDs
-
- SV-204679r961128_rule
- SV-95643
Checks: C-4802r389318_chk
Verify AAA Services are configured to protect the confidentiality and integrity of all information at rest. AAA Services may leverage the capability of an operating system or purpose-built module for this purpose. Potential locations include the local file system where configurations and events are stored or in a related database table. If AAA Services are not configured to protect the confidentiality and integrity of all information at rest, this is a finding.
Fix: F-4802r389319_fix
Configure AAA Services to protect the confidentiality and integrity of all information at rest. AAA Services may leverage the capability of an operating system or require the use of a purpose-built module for this purpose. Potential locations include the local file system where configurations and events are stored or in a related database table.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-APP-000234-AAA-000060
- Vuln IDs
-
- V-204680
- V-80823
- Rule IDs
-
- SV-204680r971528_rule
- SV-95533
Checks: C-4803r389321_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to not automatically remove emergency accounts. Emergency accounts must not have automatic termination set. If AAA Services are configured to automatically remove emergency accounts, this is a finding.
Fix: F-4803r389322_fix
Configure AAA Services to not automatically remove emergency accounts. Emergency accounts must not have automatic termination set.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001682
- Version
- SRG-APP-000234-AAA-000070
- Vuln IDs
-
- V-204681
- V-80825
- Rule IDs
-
- SV-204681r971528_rule
- SV-95535
Checks: C-4804r389324_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to not automatically disable emergency accounts. Emergency accounts must not have a maximum lifetime set. If AAA Services are configured to automatically disable emergency accounts, this is a finding.
Fix: F-4804r389325_fix
Configure AAA Services to not automatically disable emergency accounts. Emergency accounts must not have a maximum lifetime set.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000291-AAA-000130
- Vuln IDs
-
- V-204682
- V-80837
- Rule IDs
-
- SV-204682r981574_rule
- SV-95547
Checks: C-4805r981572_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify the SAs and ISSO when accounts are created. If AAA Services are not configured to notify the SAs and ISSO when accounts are created, this is a finding.
Fix: F-4805r981573_fix
Configure AAA Services to notify the SAs and the ISSO when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000292-AAA-000140
- Vuln IDs
-
- V-204683
- V-80839
- Rule IDs
-
- SV-204683r981577_rule
- SV-95549
Checks: C-4806r981575_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify the SAs and the ISSO when accounts are modified. If AAA Services are not configured to notify the SAs and the ISSO when accounts are modified, this is a finding.
Fix: F-4806r981576_fix
Configure AAA Services to notify the SAs and the ISSO when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000293-AAA-000150
- Vuln IDs
-
- V-204684
- V-80841
- Rule IDs
-
- SV-204684r981580_rule
- SV-95551
Checks: C-4807r981578_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify the SAs and the ISSO for account disabling actions. If AAA Services are not configured to notify the SAs and the ISSO for account disabling actions, this is a finding.
Fix: F-4807r981579_fix
Configure AAA Services to notify the SAs and the ISSO for account disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000294-AAA-000160
- Vuln IDs
-
- V-204685
- V-80843
- Rule IDs
-
- SV-204685r981583_rule
- SV-95553
Checks: C-4808r981581_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify the SAs and the ISSO for account removal actions. If AAA Services are not configured to notify the SAs and the ISSO for account removal actions, this is a finding.
Fix: F-4808r981582_fix
Configure AAA Services to notify the SAs and the ISSO for account removal actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-APP-000319-AAA-000170
- Vuln IDs
-
- V-204686
- V-80845
- Rule IDs
-
- SV-204686r961290_rule
- SV-95555
Checks: C-4809r389339_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically audit account enabling actions. If AAA Services are not configured to automatically audit account enabling actions, this is a finding.
Fix: F-4809r389340_fix
Configure AAA Services to automatically audit account enabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000320-AAA-000180
- Vuln IDs
-
- V-204687
- V-80847
- Rule IDs
-
- SV-204687r981586_rule
- SV-95557
Checks: C-4810r981584_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify the SAs and the ISSO of account enabling actions. If AAA Services are not configured to notify the SAs and the ISSO of account enabling actions, this is a finding.
Fix: F-4810r981585_fix
Configure AAA Services to notify the SAs and the ISSO of account enabling actions.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-AAA-000210
- Vuln IDs
-
- V-204689
- V-80855
- Rule IDs
-
- SV-204689r961368_rule
- SV-95565
Checks: C-4812r389348_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to maintain locks on user accounts until released by an administrator. If AAA Services are not configured to maintain locks on user accounts until released by an administrator, this is a finding.
Fix: F-4812r389349_fix
Configure AAA Services to maintain locks on user accounts until released by an administrator.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-AAA-000280
- Vuln IDs
-
- V-204690
- V-80869
- Rule IDs
-
- SV-204690r961395_rule
- SV-95579
Checks: C-4813r389351_chk
Verify AAA Services are configured to send audit records to a centralized audit server. If AAA Services are not configured to send audit records to a centralized audit server, this is a finding.
Fix: F-4813r389352_fix
Configure AAA Services to send audit records to a centralized audit server.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-AAA-000340
- Vuln IDs
-
- V-204691
- V-80881
- Rule IDs
-
- SV-204691r961443_rule
- SV-95591
Checks: C-4814r389354_chk
Verify AAA Services are configured to use or map to UTC to record time stamps for audit records. The audit records must either show UTC time or an offset to UTC time for each entry. If AAA Services are not configured to use or map to UTC to record time stamps for audit records, this is a finding.
Fix: F-4814r389355_fix
Configure AAA Services to use or map to UTC to record time stamps for audit records.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-AAA-000330
- Vuln IDs
-
- V-204692
- V-80879
- Rule IDs
-
- SV-204692r961446_rule
- SV-95589
Checks: C-4815r389357_chk
Verify AAA Services are configured with a minimum granularity of one second to record time stamps for audit records. If AAA Services are not configured with a minimum granularity of one second to record time stamps for audit records, this is a finding.
Fix: F-4815r389358_fix
Configure AAA Services with a minimum granularity of one second to record time stamps for audit records.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-APP-000394-AAA-000430
- Vuln IDs
-
- V-204693
- V-80899
- Rule IDs
-
- SV-204693r961503_rule
- SV-95609
Checks: C-4816r389360_chk
If AAA Services are not used for 802.1x endpoint identification and authentication, this is not applicable. Verify AAA Services are configured to authenticate supplicants before the authenticator establishes any connection. If AAA Services are not configured to authenticate supplicants before the authenticator establishes any connection, this is a finding.
Fix: F-4816r389361_fix
Configure AAA Services to authenticate supplicants before the authenticator establishes any connection.
- RMF Control
- Severity
- L
- CCI
- CCI-004923
- Version
- SRG-APP-000516-AAA-000350
- Vuln IDs
-
- V-204695
- V-80883
- Rule IDs
-
- SV-204695r981588_rule
- SV-95593
Checks: C-4818r389366_chk
Verify AAA Services are configured to use at least two NTP servers to synchronize time. Both a primary and backup NTP server must be identified in the configuration. AAA Services may leverage the capability of an operating system. If AAA Services are not configured to use at least two separate NTP servers, this is a finding.
Fix: F-4818r389367_fix
Configure AAA Services to use two separate NTP servers. Both a primary and backup NTP server must be identified in the configuration.
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- SRG-APP-000516-AAA-000360
- Vuln IDs
-
- V-204696
- V-80885
- Rule IDs
-
- SV-204696r981589_rule
- SV-95595
Checks: C-4819r389369_chk
Verify AAA Services are configured to authenticate all NTP messages received from NTP servers and peers. The NTP server or peer authentication must use a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the cipher-based message authentication code (CMAC) and the keyed-hash message authentication code (HMAC). AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256. AAA Services may leverage the capability of an operating system. If AAA Services are not configured to authenticate all NTP messages using a FIPS-approved message authentication code algorithm, this is a finding. If AAA Services are not capable of authenticating the NTP server or peer using a FIPS-approved message authentication code algorithm, but are configured to use an MD5 for NTP message authentication, this is downgraded to a CAT III.
Fix: F-4819r878053_fix
Configure AAA Services to authenticate all received NTP messages using a FIPS-approved message authentication code algorithm. When AAA Services are not capable of using FIPS-approved message authentication code algorithms, configure AAA Services to use MD5 message authentication code algorithms.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000370
- Vuln IDs
-
- V-204697
- V-80887
- Rule IDs
-
- SV-204697r961863_rule
- SV-95597
Checks: C-4820r389372_chk
Verify AAA Services are configured to use their loopback interface address as the source address when originating NTP traffic. When AAA Services are managed from an OOB management network, the OOB interface must be used instead of the loopback address for originating NTP traffic. If AAA Services are not configured to use the OOB interface when managed from an OOB management network, this is a finding. If AAA Services are not configured to use the loopback or OOB management interface as the source address when originating NTP traffic, this is a finding.
Fix: F-4820r389373_fix
Configure AAA Services to use their loopback or OOB management interface address as the source address when originating NTP traffic.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000440
- Vuln IDs
-
- V-204698
- V-80901
- Rule IDs
-
- SV-204698r961863_rule
- SV-95611
Checks: C-4821r389375_chk
Verify AAA Services used for 802.1x are configured to use secure EAP. Currently acceptable secure protocols are EAP-TLS, EAP-TTLS, and PEAP. If AAA Services used for 802.1x are not configured to use secure EAP, this is a finding.
Fix: F-4821r389376_fix
Configure AAA Services used for 802.1x to use secure EAP, such as EAP-TLS, EAP-TTLS, and PEAP.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000620
- Vuln IDs
-
- V-204699
- V-80935
- Rule IDs
-
- SV-204699r961863_rule
- SV-95645
Checks: C-4822r389378_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are not configured with shared accounts. Identify group profile definitions that do not meet the accounts user-id naming convention. Below is a super-user example of how an SA profile may be associated. Group Profile Information group = super-user{ profile_id = 40 profile_cycle = 1 service=shell { default cmd=permit cmd=debug { deny all permit .* } } } Below is an example of the user definition that should be assigned with a valid ID (not rtr-geek). Look for group accounts here: user = rtr-geek{ profile_id = 45 profile_cycle = 1 member = rtr_super password = des "********" } If AAA Services are configured with shared accounts (group profiles), this is a finding.
Fix: F-4822r389379_fix
Configure AAA Services with no shared accounts. Remove all group profiles.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000630
- Vuln IDs
-
- V-204700
- V-80937
- Rule IDs
-
- SV-204700r961863_rule
- SV-95647
Checks: C-4823r389381_chk
If AAA Services are not used for authentication of privileged users to AAA Services, this is not applicable. Verify AAA Services are configured to connect to the management network. Confirm AAA Services are not dual-homed by physically inspecting the physical LAN connection. If AAA Services are configured to connect to a non-management network, this is a finding.
Fix: F-4823r389382_fix
Configure AAA Services used to authenticate privileged users for device management to connect to the management network.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000640
- Vuln IDs
-
- V-204701
- V-80939
- Rule IDs
-
- SV-204701r961863_rule
- SV-95649
Checks: C-4824r389384_chk
If AAA Services are not used for 802.1x authentication or to authenticate privileged users for device management, this is not applicable. Verify AAA Services are configured to use a unique shared secret with clients requesting authentication services. The shared secret is to be the same for communication between AAA Services and the client devices. All shared secrets must meet password complexity requirements. If AAA Services are not configured to use a unique shared secret for communication with clients requesting authentication services, this is a finding.
Fix: F-4824r389385_fix
Configure AAA Services to use a unique shared secret for communication (i.e. RADIUS, TACACS+) with all clients requesting authentication services.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000650
- Vuln IDs
-
- V-204702
- V-80941
- Rule IDs
-
- SV-204702r961863_rule
- SV-95651
Checks: C-4825r389387_chk
If AAA Services are not used for 802.1x authentication or to authenticate privileged users for device management, this is not applicable. Verify AAA Services are configured to use IP segments separate from production VLAN IP segments. If AAA Services are not configured to use IP segments separate from production VLAN IP segments, this is a finding.
Fix: F-4825r389388_fix
Configure AAA Services to use IP segments separate from production VLAN IP segments.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000660
- Vuln IDs
-
- V-204703
- V-80943
- Rule IDs
-
- SV-204703r961863_rule
- SV-95653
Checks: C-4826r389390_chk
If AAA Services are not used for 802.1x authentication or to authenticate privileged users for device management, this is not applicable. Verify AAA Services are configured to place non-authenticated network access requests in the Unauthorized VLAN or the Guest VLAN with limited access. If the SA has created a dynamic Unauthorized VLAN, definitions should not have an IP pool assignment. Ensure the Unauthorized VLAN is configured without IP or a Guest VLAN is defined with limited access. If AAA Services are not configured to place non-authenticated network access requests in the Unauthorized VLAN or the Guest VLAN with limited access, this is a finding.
Fix: F-4826r389391_fix
Configure AAA Services to place non-authenticated network access requests in the Unauthorized VLAN without access to production data. Implement a NAC solution where the device remains without IP assignment if authentication fails or create a dynamic Unauthorized VLAN/Guest VLAN with limited access in AAA server. If a Guest VLAN is built, it should not have access to production data.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000690
- Vuln IDs
-
- V-204704
- V-80949
- Rule IDs
-
- SV-204704r961863_rule
- SV-95659
Checks: C-4827r391864_chk
Determine if AAA Services are configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If AAA Services are not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-4827r391865_fix
Configure the network device to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- Severity
- M
- CCI
- CCI-003627
- Version
- SRG-APP-000700-AAA-000100
- Vuln IDs
-
- V-263527
- Rule IDs
-
- SV-263527r982381_rule
Checks: C-67427r982380_chk
Verify AAA Services is configured to disable accounts when the accounts have expired. If AAA Services is not configured to disable accounts when the accounts have expired, this is a finding.
Fix: F-67335r981591_fix
Configure AAA Services to disable accounts when the accounts have expired.
- RMF Control
- Severity
- M
- CCI
- CCI-003628
- Version
- SRG-APP-000705-AAA-000110
- Vuln IDs
-
- V-263528
- Rule IDs
-
- SV-263528r982383_rule
Checks: C-67428r982382_chk
Verify AAA Services is configured to disable accounts when the accounts are no longer associated to a user. If AAA Services is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Fix: F-67336r981594_fix
Configure AAA Services to disable accounts when the accounts are no longer associated to a user.
- RMF Control
- Severity
- M
- CCI
- CCI-003629
- Version
- SRG-APP-000710-AAA-000120
- Vuln IDs
-
- V-263529
- Rule IDs
-
- SV-263529r982385_rule
Checks: C-67429r982384_chk
Verify AAA Services is configured to disable accounts when the accounts are in violation of organizational policy. If AAA Services is not configured to disable accounts when the accounts are in violation of organizational policy, this is a finding.
Fix: F-67337r981597_fix
Configure AAA Services to disable accounts when the accounts are in violation of organizational policy.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- SRG-APP-000805-AAA-000130
- Vuln IDs
-
- V-263530
- Rule IDs
-
- SV-263530r982387_rule
Checks: C-67430r982386_chk
Verify AAA Services is configured to automatically generate audit records of the enforcement actions. If AAA Services is not configured to automatically generate audit records of the enforcement actions, this is a finding.
Fix: F-67338r981600_fix
Configure AAA Services to automatically generate audit records of the enforcement actions.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000815-AAA-000140
- Vuln IDs
-
- V-263531
- Rule IDs
-
- SV-263531r982389_rule
Checks: C-67431r982388_chk
Verify AAA Services is configured to require users to be individually authenticated before granting access to the shared accounts or resources. If AAA Services is not configured to require users to be individually authenticated before granting access to the shared accounts or resources, this is a finding.
Fix: F-67339r981603_fix
Configure AAA Services to require users to be individually authenticated before granting access to the shared accounts or resources.
- RMF Control
- Severity
- M
- CCI
- CCI-004059
- Version
- SRG-APP-000835-AAA-000150
- Vuln IDs
-
- V-263532
- Rule IDs
-
- SV-263532r981607_rule
Checks: C-67432r981605_chk
Verify AAA Services is configured to update the list of passwords on an organization-defined frequency. If AAA Services is not configured to update the list of passwords on an organization-defined frequency, this is a finding.
Fix: F-67340r981606_fix
Configure AAA Services to update the list of passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004060
- Version
- SRG-APP-000840-AAA-000160
- Vuln IDs
-
- V-263533
- Rule IDs
-
- SV-263533r981610_rule
Checks: C-67433r981608_chk
Verify AAA Services is configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly. If AAA Services is not configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly, this is a finding.
Fix: F-67341r981609_fix
Configure AAA Services to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- SRG-APP-000845-AAA-000170
- Vuln IDs
-
- V-263534
- Rule IDs
-
- SV-263534r981613_rule
Checks: C-67434r981611_chk
Verify AAA Services is configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a). If AAA Services is not configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a), this is a finding.
Fix: F-67342r981612_fix
Configure AAA Services to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- RMF Control
- Severity
- M
- CCI
- CCI-004063
- Version
- SRG-APP-000855-AAA-000190
- Vuln IDs
-
- V-263535
- Rule IDs
-
- SV-263535r981616_rule
Checks: C-67435r981614_chk
Verify AAA Services is configured to require immediate selection of a new password upon account recovery. If AAA Services is not configured to require immediate selection of a new password upon account recovery, this is a finding.
Fix: F-67343r981615_fix
Configure AAA Services to require immediate selection of a new password upon account recovery.
- RMF Control
- Severity
- M
- CCI
- CCI-004064
- Version
- SRG-APP-000860-AAA-000200
- Vuln IDs
-
- V-263536
- Rule IDs
-
- SV-263536r981619_rule
Checks: C-67436r981617_chk
Verify AAA Services is configured to allow user selection of long passwords and passphrases, including spaces and all printable characters. If AAA Services is not configured to allow user selection of long passwords and passphrases, including spaces and all printable characters, this is a finding.
Fix: F-67344r981618_fix
Configure AAA Services to allow user selection of long passwords and passphrases, including spaces and all printable characters.
- RMF Control
- Severity
- M
- CCI
- CCI-004065
- Version
- SRG-APP-000865-AAA-000210
- Vuln IDs
-
- V-263537
- Rule IDs
-
- SV-263537r981622_rule
Checks: C-67437r981620_chk
Verify AAA Services is configured to employ automated tools to assist the user in selecting strong password authenticators. If AAA Services is not configured to employ automated tools to assist the user in selecting strong password authenticators, this is a finding.
Fix: F-67345r981621_fix
Configure AAA Services to employ automated tools to assist the user in selecting strong password authenticators.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-APP-000875-AAA-000220
- Vuln IDs
-
- V-263538
- Rule IDs
-
- SV-263538r981625_rule
Checks: C-67438r981623_chk
Verify AAA Services is configured to implement a local cache of revocation data to support path discovery and validation. If AAA Services is not configured to implement a local cache of revocation data to support path discovery and validation, this is a finding.
Fix: F-67346r981624_fix
Configure AAA Services to implement a local cache of revocation data to support path discovery and validation.
- RMF Control
- Severity
- M
- CCI
- CCI-004909
- Version
- SRG-APP-000910-AAA-000230
- Vuln IDs
-
- V-263539
- Rule IDs
-
- SV-263539r981628_rule
Checks: C-67439r981626_chk
Verify AAA Services is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If AAA Services is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix: F-67347r981627_fix
Configure AAA Services to include only approved trust anchors in trust stores or certificate stores managed by the organization.