Authentication, Authorization, and Accounting Services (AAA) Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-80871 Medium checkfix AAA Services must be configured to alert the SA and ISSO when any audit processing failure occurs.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- SRG-APP-000142-AAA-000010
- Vuln IDs
-
- V-80815
- Rule IDs
-
- SV-95525r1_rule
Checks: C-80551r4_chk
If AAA Services do not connect to a directory services or other identity provider, but instead perform user and device account management as part of their functionality, this is not applicable. Review the AAA Services configuration when connecting to directory services or another identity provider. Verify the connection is configured to use secure protocols for transport between AAA Services and the directory services using mutual authentication. The use of LDAP over TLS (LDAPS) is the most common method to secure the directory services or user database traffic. Each protocol egressing the local enclave must be implemented in accordance with its PPSM CAL. If AAA Services do not use secure protocols when connecting to directory services, this is a finding. If the protocols are not implemented in accordance with the PPSM CAL, this is a finding.
Fix: F-87669r3_fix
Configure AAA Services to use secure protocols when connecting to directory services. The use of LDAP over TLS (LDAPS) is the most common method to secure the directory services or user database traffic. However, proprietary or other protocols may be used in some configurations. Each protocol egressing the local enclave must be implemented in accordance with its PPSM CAL.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- SRG-APP-000142-AAA-000020
- Vuln IDs
-
- V-80817
- Rule IDs
-
- SV-95527r1_rule
Checks: C-80553r3_chk
Verify AAA Services are configured to use protocols that encrypt credentials when authenticating clients. Both the RADIUS and TACACS+ protocols are acceptable when configured to perform encryption. For any protocol implemented, the PPSM CAL and vulnerability assessments must be reviewed to ensure the protocols are properly configured. If AAA Services are not configured to use protocols that encrypt credentials when authenticating clients, as defined in the PPSM CAL and vulnerability assessments, this is a finding.
Fix: F-87671r3_fix
Configure AAA Services to use protocols that encrypt credentials when authenticating clients. Both the RADIUS and TACACS+ protocols are acceptable when configured to perform encryption. For any protocol implemented, the PPSM CAL and vulnerability assessments must be reviewed to ensure the protocols are properly configured.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000023-AAA-000030
- Vuln IDs
-
- V-80819
- Rule IDs
-
- SV-95529r1_rule
Checks: C-80555r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to provide automated account management functions. Automated functions include disabling accounts after specified periods of inactivity, locking accounts after a specified number of incorrect logon attempts, etc. Where possible, automated functions must be performed on users and devices globally rather than by each individual account. If AAA Services do not provide automated account management functions, this is a finding.
Fix: F-87673r3_fix
Configure AAA Services to provide automated account management functions. Automated functions include disabling accounts after specified periods of inactivity, locking accounts after a specified number of incorrect logon attempts, etc. Where possible, automated functions must be performed on users and devices globally rather than by each individual account.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-AAA-000050
- Vuln IDs
-
- V-80821
- Rule IDs
-
- SV-95531r1_rule
Checks: C-80557r3_chk
If AAA Services do not provide authorizations based on external directory services, this is not applicable. Verify AAA Services are configured to automatically remove authorizations for temporary user accounts after 72 hours. If the AAA Services configuration does not automatically remove authorizations for temporary user accounts after 72 hours, this is a finding.
Fix: F-87675r3_fix
Configure AAA Services to automatically remove authorizations for temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-APP-000234-AAA-000060
- Vuln IDs
-
- V-80823
- Rule IDs
-
- SV-95533r1_rule
Checks: C-80559r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to not automatically remove emergency accounts. Emergency accounts must not have automatic termination set. If AAA Services are configured to automatically remove emergency accounts, this is a finding.
Fix: F-87677r3_fix
Configure AAA Services to not automatically remove emergency accounts. Emergency accounts must not have automatic termination set.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001682
- Version
- SRG-APP-000234-AAA-000070
- Vuln IDs
-
- V-80825
- Rule IDs
-
- SV-95535r1_rule
Checks: C-80561r1_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to not automatically disable emergency accounts. Emergency accounts must not have a maximum lifetime set. If AAA Services are configured to automatically disable emergency accounts, this is a finding.
Fix: F-87679r1_fix
Configure AAA Services to not automatically disable emergency accounts. Emergency accounts must not have a maximum lifetime set.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- SRG-APP-000025-AAA-000080
- Vuln IDs
-
- V-80827
- Rule IDs
-
- SV-95537r1_rule
Checks: C-80563r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically disable accounts after a 35-day period of account inactivity. If the AAA Services configuration does not automatically disable accounts after a 35-day period of account inactivity, this is a finding.
Fix: F-87681r3_fix
Configure AAA Services to automatically disable accounts after a 35-day period of account inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-AAA-000090
- Vuln IDs
-
- V-80829
- Rule IDs
-
- SV-95539r1_rule
Checks: C-80565r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically audit account creation. If AAA Services are not configured to automatically audit account creation, this is a finding.
Fix: F-87683r3_fix
Configure AAA Services to automatically audit account creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-AAA-000100
- Vuln IDs
-
- V-80831
- Rule IDs
-
- SV-95541r1_rule
Checks: C-80567r1_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically audit account modification. If AAA Services are not configured to automatically audit account modification, this is a finding.
Fix: F-87685r3_fix
Configure AAA Services to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-AAA-000110
- Vuln IDs
-
- V-80833
- Rule IDs
-
- SV-95543r1_rule
Checks: C-80569r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically audit account disabling actions. If AAA Services are not configured to automatically audit account disabling actions, this is a finding.
Fix: F-87687r3_fix
Configure AAA Services to automatically audit account disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-AAA-000120
- Vuln IDs
-
- V-80835
- Rule IDs
-
- SV-95545r1_rule
Checks: C-80571r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically audit account removal actions. If AAA Services are not configured to automatically audit account removal actions, this is a finding.
Fix: F-87689r3_fix
Configure AAA Services to automatically audit account removal actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001683
- Version
- SRG-APP-000291-AAA-000130
- Vuln IDs
-
- V-80837
- Rule IDs
-
- SV-95547r1_rule
Checks: C-80573r4_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify the system administrators and ISSO when accounts are created. If AAA Services are not configured to notify the system administrators and ISSO when accounts are created, this is a finding.
Fix: F-87691r3_fix
Configure AAA Services to notify the system administrators and ISSO when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001684
- Version
- SRG-APP-000292-AAA-000140
- Vuln IDs
-
- V-80839
- Rule IDs
-
- SV-95549r1_rule
Checks: C-80575r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify the system administrators and ISSO when accounts are modified. If AAA Services are not configured to notify the system administrators and ISSO when accounts are modified, this is a finding.
Fix: F-87693r3_fix
Configure AAA Services to notify the system administrators and ISSO when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001685
- Version
- SRG-APP-000293-AAA-000150
- Vuln IDs
-
- V-80841
- Rule IDs
-
- SV-95551r1_rule
Checks: C-80577r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify the system administrators and ISSO for account disabling actions. If AAA Services are not configured to notify the system administrators and ISSO for account disabling actions, this is a finding.
Fix: F-87695r3_fix
Configure AAA Services to notify system administrators and ISSO for account disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001686
- Version
- SRG-APP-000294-AAA-000160
- Vuln IDs
-
- V-80843
- Rule IDs
-
- SV-95553r1_rule
Checks: C-80579r4_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify the system administrators and ISSO for account removal actions. If AAA Services are not configured to notify the system administrators and ISSO for account removal actions, this is a finding.
Fix: F-87697r3_fix
Configure AAA Services to notify system administrators and ISSO for account removal actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-APP-000319-AAA-000170
- Vuln IDs
-
- V-80845
- Rule IDs
-
- SV-95555r1_rule
Checks: C-80581r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically audit account enabling actions. If AAA Services are not configured to automatically audit account enabling actions, this is a finding.
Fix: F-87699r3_fix
Configure AAA Services to automatically audit account enabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- SRG-APP-000320-AAA-000180
- Vuln IDs
-
- V-80847
- Rule IDs
-
- SV-95557r1_rule
Checks: C-80583r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to notify system administrator and ISSO of account enabling actions. If AAA Services are not configured to notify the system administrator and ISSO of account enabling actions, this is a finding.
Fix: F-87701r3_fix
Configure AAA Services to notify system administrator and ISSO of account enabling actions.
- RMF Control
- AC-3
- Severity
- L
- CCI
- CCI-002169
- Version
- SRG-APP-000329-AAA-000190
- Vuln IDs
-
- V-80849
- Rule IDs
-
- SV-95559r1_rule
Checks: C-80585r2_chk
Verify AAA Services are configured to use RBAC policy for levels of access authorization. Confirm the RBAC groups have tiered privileges, and users are in the appropriate groups. In the following TACACS+ example the user (test-user) is a member of the group “test-group”. <CSUserver>$/opt/ciscosecure/CLI/ViewProfile -p 9900 -u user-test User Profile Information user = test-user{ profile_id = 66 profile_cycle = 1 member = test-group password = des "********" } Below is an example of CiscoSecure TACACS+ server defining the privilege level. user = test-user{ password = clear "xxxxx" service = shell { set priv-lvl = 7 } } If AAA Services are not configured to use RBAC policy for levels of access authorization, this is a finding.
Fix: F-87703r1_fix
Configure AAA Services to use RBAC policy for levels of access authorization. Configure AAA Services with standard accounts and assign them to privilege levels that meet their job description.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-AAA-000200
- Vuln IDs
-
- V-80851
- Rule IDs
-
- SV-95561r1_rule
Checks: C-80587r1_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically lock user accounts after three consecutive invalid logon attempts within a 15-minute time period. If AAA Services are not configured to automatically lock user accounts after three consecutive invalid logon attempts within a 15-minute time period, this is a finding.
Fix: F-87705r1_fix
Configure AAA Services to automatically lock user accounts after three consecutive invalid logon attempts within a 15-minute time period.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-AAA-000210
- Vuln IDs
-
- V-80855
- Rule IDs
-
- SV-95565r1_rule
Checks: C-80591r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to maintain locks on user accounts until released by an administrator. If AAA Services are not configured to maintain locks on user accounts until released by an administrator, this is a finding.
Fix: F-87709r3_fix
Configure AAA Services to maintain locks on user accounts until released by an administrator.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-AAA-000220
- Vuln IDs
-
- V-80857
- Rule IDs
-
- SV-95567r1_rule
Checks: C-80593r3_chk
Verify AAA Services configuration audit records identify what type of events occurred. If AAA Services configuration audit records do not identify what type of events occurred, this is a finding.
Fix: F-87711r3_fix
Configure AAA Services audit records to identify what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-AAA-000230
- Vuln IDs
-
- V-80859
- Rule IDs
-
- SV-95569r1_rule
Checks: C-80595r3_chk
Verify AAA Services configuration audit records identify the date and time events occurred. If AAA Services configuration audit records do not identify when the events occurred, this is a finding.
Fix: F-87713r4_fix
Configure AAA Services audit records to identify when the events occurred by specifying the date and time.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-AAA-000240
- Vuln IDs
-
- V-80861
- Rule IDs
-
- SV-95571r1_rule
Checks: C-80597r1_chk
Verify AAA Services configuration audit records identify where the events occurred. If AAA Services configuration audit records do not identify where the events occurred, this is a finding.
Fix: F-87715r1_fix
Configure AAA Services audit records to identify where the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-AAA-000250
- Vuln IDs
-
- V-80863
- Rule IDs
-
- SV-95573r1_rule
Checks: C-80599r1_chk
Verify AAA Services configuration audit records identify the source of the events. If AAA Services configuration audit records do not identify the source of the events, this is a finding.
Fix: F-87717r1_fix
Configure AAA Services configuration audit records to identify the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-AAA-000260
- Vuln IDs
-
- V-80865
- Rule IDs
-
- SV-95575r1_rule
Checks: C-80601r1_chk
Verify AAA Services configuration audit records identify the outcome of the events. If AAA Services configuration audit records do not identify the outcome of the events, this is a finding.
Fix: F-87719r1_fix
Configure AAA Services configuration audit records to identify the outcome of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-AAA-000270
- Vuln IDs
-
- V-80867
- Rule IDs
-
- SV-95577r1_rule
Checks: C-80603r1_chk
Verify AAA Services configuration audit records identify any individual user associated with the event. When a system process rather than an individual user causes the event, the process must be identified in the audit record. If AAA Services configuration audit records do not identify any individual user or process associated with the event, this is a finding.
Fix: F-87721r1_fix
Configure AAA Services configuration audit records to identify any individual user associated with the event. When events are caused by a system process rather than an individual user, that process must be identified in the audit record.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-AAA-000280
- Vuln IDs
-
- V-80869
- Rule IDs
-
- SV-95579r1_rule
Checks: C-80605r1_chk
Verify AAA Services are configured to send audit records to a centralized audit server. If AAA Services are not configured to send audit records to a centralized audit server, this is a finding.
Fix: F-87723r1_fix
Configure AAA Services to send audit records to a centralized audit server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-AAA-000290
- Vuln IDs
-
- V-80871
- Rule IDs
-
- SV-95581r2_rule
Checks: C-80607r2_chk
Verify AAA Services are configured to alert the SA and ISSO when any audit processing failure occurs. If AAA Services are not configured to alert the SA and ISSO when any audit processing failure occurs, this is a finding.
Fix: F-87725r2_fix
Configure AAA Services to alert the SA and ISSO when any audit processing failure occurs.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-AAA-000300
- Vuln IDs
-
- V-80873
- Rule IDs
-
- SV-95583r1_rule
Checks: C-80609r1_chk
Verify AAA Services are configured to generate audit records overwriting the oldest audit records in a first-in-first-out manner. When failures are caused by the lack of audit record storage capacity, AAA Services must continue generating audit records. If AAA Services are not configured to generate audit records overwriting the oldest audit records in a first-in-first-out manner, this is a finding.
Fix: F-87727r1_fix
Configure AAA Services to generate audit records overwriting the oldest audit records in a first-in-first-out manner. Some specific implementations may further require automatically restarting the audit service to synchronize the local audit data with the collection server. The configuration must continue generating audit records, even when failures are caused by the lack of audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-AAA-000310
- Vuln IDs
-
- V-80875
- Rule IDs
-
- SV-95585r1_rule
Checks: C-80611r1_chk
Verify AAA Services are configured to queue audit records locally when any audit processing failure occurs. The queuing must continue until communication is restored or until the audit records are retrieved manually. Some specific implementations may further require automatically restarting the audit service to synchronize the local audit data with the collection server. If AAA Services are not configured to queue audit records locally until communication is restored when any audit processing failure occurs, this is a finding.
Fix: F-87729r1_fix
Configure AAA Services to queue audit records locally until communication is restored when any audit processing failure occurs. Some specific implementations may further require automatically restarting the audit service to synchronize the local audit data with the collection server. In some cases, AAA Services may require the audit records to be retrieved manually in the event of audit failure.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-AAA-000320
- Vuln IDs
-
- V-80877
- Rule IDs
-
- SV-95587r1_rule
Checks: C-80613r1_chk
Verify AAA Services are configured to use internal system clocks to generate time stamps for audit records. If AAA Services are not configured to use internal system clocks to generate time stamps for audit records, this is a finding.
Fix: F-87731r1_fix
Configure AAA Services to use internal system clocks to generate time stamps for audit records.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-AAA-000330
- Vuln IDs
-
- V-80879
- Rule IDs
-
- SV-95589r1_rule
Checks: C-80615r1_chk
Verify AAA Services are configured with a minimum granularity of one second to record time stamps for audit records. If AAA Services are not configured with a minimum granularity of one second to record time stamps for audit records, this is a finding.
Fix: F-87733r1_fix
Configure AAA Services with a minimum granularity of one second to record time stamps for audit records.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-AAA-000340
- Vuln IDs
-
- V-80881
- Rule IDs
-
- SV-95591r1_rule
Checks: C-80617r1_chk
Verify AAA Services are configured to use or map to UTC to record time stamps for audit records. The audit records must either show UTC time or an offset to UTC time for each entry. If AAA Services are not configured to use or map to UTC to record time stamps for audit records, this is a finding.
Fix: F-87735r1_fix
Configure AAA Services to use or map to UTC to record time stamps for audit records.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000350
- Vuln IDs
-
- V-80883
- Rule IDs
-
- SV-95593r1_rule
Checks: C-80619r1_chk
Verify AAA Services are configured to use at least two NTP servers to synchronize time. Both a primary and backup NTP server must be identified in the configuration. AAA Services may leverage the capability of an operating system. If AAA Services are not configured to use at least two separate NTP servers, this is a finding.
Fix: F-87737r1_fix
Configure AAA Services to use two separate NTP servers. Both a primary and backup NTP server must be identified in the configuration.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000360
- Vuln IDs
-
- V-80885
- Rule IDs
-
- SV-95595r1_rule
Checks: C-80623r1_chk
Verify AAA Services are configured to authenticate all NTP messages received from NTP servers and peers. The NTP server or peer authentication must use a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the cipher-based message authentication code (CMAC) and the keyed-hash message authentication code (HMAC). AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256. AAA Services may leverage the capability of an operating system. If AAA Services are not configured to authenticate all NTP messages using a FIPS-approved message authentication code algorithm, this is a finding. If AAA Services are not capable of authenticating the NTP server or peer using a FIPS-approved message authentication code algorithm, but are configured to use an MD5 for NTP message authentication, this is downgraded to a CAT III.
Fix: F-87741r1_fix
Configure AAA Services to authenticate all received NTP messages using a FIPS-approved message authentication code algorithm. When AAA Services are not capable of using FIPS-approved message authentication code algorithms, configure AAA Services to use MD5 message authentication code algorithms.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000370
- Vuln IDs
-
- V-80887
- Rule IDs
-
- SV-95597r1_rule
Checks: C-80625r1_chk
Verify AAA Services are configured to use their loopback interface address as the source address when originating NTP traffic. When AAA Services are managed from an OOB management network, the OOB interface must be used instead of the loopback address for originating NTP traffic. If AAA Services are not configured to use the OOB interface when managed from an OOB management network, this is a finding. If AAA Services are not configured to use the loopback or OOB management interface as the source address when originating NTP traffic, this is a finding.
Fix: F-87743r1_fix
Configure AAA Services to use their loopback or OOB management interface address as the source address when originating NTP traffic.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-AAA-000380
- Vuln IDs
-
- V-80889
- Rule IDs
-
- SV-95599r1_rule
Checks: C-80627r1_chk
Verify AAA Services are configured to audit each authentication and authorization transaction. If AAA Services are not configured to audit each authentication and authorization transaction, this is a finding.
Fix: F-87745r1_fix
Configure AAA Services to audit each authentication and authorization transaction.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- SRG-APP-000148-AAA-000390
- Vuln IDs
-
- V-80891
- Rule IDs
-
- SV-95601r1_rule
Checks: C-80629r1_chk
Verify AAA Services are configured to uniquely identify and authenticate organizational users. For STIGs produced from this requirement, when AAA Services are used to authenticate processes acting on behalf of organizational users, they also must be uniquely identified and authenticated. If AAA Services are not configured to uniquely identify and authenticate organizational users, this is a finding.
Fix: F-87747r1_fix
Configure AAA Services to uniquely identify and authenticate organizational users.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-AAA-000400
- Vuln IDs
-
- V-80893
- Rule IDs
-
- SV-95603r1_rule
Checks: C-80631r1_chk
Verify AAA Services are configured to require multifactor authentication using PIV credentials for authenticating privileged user accounts. Although the Common Access Card (CAC) is a PIV credential, it should not be used for privileged accounts, but rather only for non-privileged accounts. Administrative smart cards and tokens, separate from the CAC, are the preferred solution for privileged accounts. If AAA Services are not configured to require multifactor authentication using PIV credentials for authenticating privileged user accounts, this is a finding.
Fix: F-87749r1_fix
Configure AAA Services to require multifactor authentication using PIV credentials for authenticating privileged user accounts. Although the CAC is a PIV credential, it should not be used for privileged accounts, but rather only for non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000150-AAA-000410
- Vuln IDs
-
- V-80895
- Rule IDs
-
- SV-95605r1_rule
Checks: C-80633r1_chk
Verify AAA Services are configured to require multifactor authentication using CAC PIV credentials for authenticating non-privileged user accounts. If AAA Services are not configured to require multifactor authentication using CAC PIV credentials for authenticating non-privileged user accounts, this is a finding.
Fix: F-87751r1_fix
Configure AAA Services to require multifactor authentication using CAC PIV credentials for authenticating non-privileged user accounts.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-APP-000158-AAA-000420
- Vuln IDs
-
- V-80897
- Rule IDs
-
- SV-95607r1_rule
Checks: C-80635r1_chk
If AAA Services are not used for 802.1x endpoint identification and authentication, this is not applicable. Verify AAA Services are configured to uniquely identify supplicants before the authenticator establishes any connection. If AAA Services are not configured to uniquely identify supplicants before the authenticator establishes any connection, this is a finding.
Fix: F-87753r1_fix
Configure AAA Services for 802.1x identification and authentication to uniquely identify supplicants before the authenticator establishes any connection.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-APP-000394-AAA-000430
- Vuln IDs
-
- V-80899
- Rule IDs
-
- SV-95609r1_rule
Checks: C-80637r1_chk
If AAA Services are not used for 802.1x endpoint identification and authentication, this is not applicable. Verify AAA Services are configured to authenticate supplicants before the authenticator establishes any connection. If AAA Services are not configured to authenticate supplicants before the authenticator establishes any connection, this is a finding.
Fix: F-87755r1_fix
Configure AAA Services to authenticate supplicants before the authenticator establishes any connection.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000440
- Vuln IDs
-
- V-80901
- Rule IDs
-
- SV-95611r1_rule
Checks: C-80639r1_chk
Verify AAA Services used for 802.1x are configured to use secure EAP. Currently acceptable secure protocols are EAP-TLS, EAP-TTLS, and PEAP. If AAA Services used for 802.1x are not configured to use secure EAP, this is a finding.
Fix: F-87757r1_fix
Configure AAA Services used for 802.1x to use secure EAP, such as EAP-TLS, EAP-TTLS, and PEAP.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SRG-APP-000164-AAA-000450
- Vuln IDs
-
- V-80903
- Rule IDs
-
- SV-95613r1_rule
Checks: C-80641r2_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords (to include randomly assigned passwords, shared secrets, and pre-shared keys) are used, verify AAA Services are configured to enforce a minimum 15-character password length. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to enforce a minimum 15-character password length, this is a finding.
Fix: F-87759r2_fix
Configure AAA Services to enforce a minimum 15-character password length. This includes randomly assigned passwords, shared secrets, and pre-shared keys.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- SRG-APP-000166-AAA-000460
- Vuln IDs
-
- V-80905
- Rule IDs
-
- SV-95615r1_rule
Checks: C-80643r2_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords (to include randomly assigned passwords, shared secrets, and pre-shared keys) are used, verify AAA Services are configured to enforce password complexity by requiring that at least one upper-case character be used. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to require that at least one upper-case character be used, this is a finding.
Fix: F-87761r2_fix
Configure AAA Services to enforce password complexity by requiring that at least one upper-case character be used. This includes randomly assigned passwords, shared secrets, and pre-shared keys.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- SRG-APP-000167-AAA-000470
- Vuln IDs
-
- V-80907
- Rule IDs
-
- SV-95617r1_rule
Checks: C-80645r2_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords (to include randomly assigned passwords, shared secrets, and pre-shared keys) are used, verify AAA Services are configured to enforce password complexity by requiring that at least one lower-case character be used. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to require that at least one lower-case character be used, this is a finding.
Fix: F-87763r2_fix
Configure AAA Services to enforce password complexity by requiring that at least one lower-case character be used. This includes randomly assigned passwords, shared secrets, and pre-shared keys.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- SRG-APP-000168-AAA-000480
- Vuln IDs
-
- V-80909
- Rule IDs
-
- SV-95619r1_rule
Checks: C-80647r2_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords (to include randomly assigned passwords, shared secrets, and pre-shared keys) are used, verify AAA Services are configured to enforce password complexity by requiring that at least one numeric character be used. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to require that at least one numeric character be used, this is a finding.
Fix: F-87765r2_fix
Configure AAA Services to enforce password complexity by requiring that at least one numeric character be used. This includes randomly assigned passwords, shared secrets, and pre-shared keys.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- SRG-APP-000169-AAA-000490
- Vuln IDs
-
- V-80911
- Rule IDs
-
- SV-95621r1_rule
Checks: C-80649r2_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords (to include randomly assigned passwords, shared secrets, and pre-shared keys) are used, verify AAA Services are configured to enforce password complexity by requiring that at least one special character be used. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to require that at least one special character be used, this is a finding.
Fix: F-87767r2_fix
Configure AAA Services to enforce password complexity by requiring that at least one special character be used. This includes randomly assigned passwords, shared secrets, and pre-shared keys.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- SRG-APP-000170-AAA-000500
- Vuln IDs
-
- V-80913
- Rule IDs
-
- SV-95623r1_rule
Checks: C-80651r1_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Where passwords are used, verify AAA Services are configured to require the change of at least eight of the total number of characters when passwords are changed. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to require the change of at least eight of the total number of characters when passwords are changed, this is a finding.
Fix: F-87769r1_fix
Configure AAA Services to require the change of at least eight of the total number of characters when passwords are changed. Note: The best practice would be to require that all characters must be changed with each password change, especially for privileged accounts.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-APP-000172-AAA-000520
- Vuln IDs
-
- V-80915
- Rule IDs
-
- SV-95625r1_rule
Checks: C-80653r1_chk
Where passwords are used, verify AAA Services are configured to encrypt transmitted credentials using a FIPS-validated cryptographic module. AAA Services may leverage the capability of an operating system or purpose-built module for this purpose. If AAA Services are not configured to encrypt transmitted credentials using a FIPS-validated cryptographic module, this is a finding. Note: FIPS-validated cryptographic modules are listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
Fix: F-87771r1_fix
Configure AAA Services to encrypt transmitted credentials using a FIPS-validated cryptographic module.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- SRG-APP-000173-AAA-000530
- Vuln IDs
-
- V-80917
- Rule IDs
-
- SV-95627r1_rule
Checks: C-80655r2_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. This requirement is not applicable to service account passwords (e.g. shared secrets, pre-shared keys) or the account of last resort. Where passwords are used, such as temporary or emergency accounts, verify AAA Services are configured to enforce 24 hours as the minimum password lifetime. When the AAA Services configuration setting is for "1 day", it is required that the length be 24 hours. If AAA Services are not configured to enforce 24 hours as the minimum password lifetime, this is a finding.
Fix: F-87773r2_fix
Configure AAA Services to enforce 24 hours as the minimum password lifetime. When the AAA Services configuration setting is for "1 day", it is required that the length be 24 hours. This requirement is not applicable to service account passwords (e.g. shared secrets, pre-shared keys) or the account of last resort.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- SRG-APP-000174-AAA-000540
- Vuln IDs
-
- V-80919
- Rule IDs
-
- SV-95629r1_rule
Checks: C-80657r2_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. This requirement is not applicable to service account passwords (e.g. shared secrets, pre-shared keys) or the account of last resort. Where passwords are used, such as temporary or emergency accounts, verify AAA Services are configured to enforce a 60-day maximum password lifetime restriction. Additionally, AAA Services must force password change upon the first logon after the expiration of the 60 days. If AAA Services are not configured to enforce a 60-day maximum password lifetime restriction, this is a finding.
Fix: F-87775r3_fix
Configure AAA Services to enforce a 60-day maximum password lifetime restriction. Additionally, configure AAA Services to force password change upon the first logon after the expiration of the 60 days. This requirement is not applicable to service account passwords (e.g. shared secrets, pre-shared keys) or the account of last resort.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- SRG-APP-000165-AAA-000550
- Vuln IDs
-
- V-80921
- Rule IDs
-
- SV-95631r1_rule
Checks: C-80659r3_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. This requirement is not applicable to service account passwords (e.g. shared secrets, pre-shared keys) or the account of last resort. Where passwords are used, such as temporary or emergency accounts, verify AAA Services are configured to prohibit password reuse for a minimum of five generations. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to prohibit password reuse for a minimum of five generations, this is a finding.
Fix: F-87777r2_fix
Configure AAA Services to prohibit password reuse for a minimum of five generations. This requirement is not applicable to service account passwords (e.g. shared secrets, pre-shared keys) or the account of last resort.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-APP-000397-AAA-000560
- Vuln IDs
-
- V-80923
- Rule IDs
-
- SV-95633r1_rule
Checks: C-80661r2_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. This requirement is not applicable to service account passwords (e.g. shared secrets, pre-shared keys) or the account of last resort. Where passwords are used, such as temporary or emergency accounts, verify AAA Services are configured to allow the use of a temporary password at initial logon with an immediate change to a permanent password. This requirement may be verified by demonstration or configuration review. If AAA Services are not configured to allow the use of a temporary password at initial logon with an immediate change to a permanent password, this is a finding.
Fix: F-87779r2_fix
Configure AAA Services to allow the use of a temporary password at initial logon with an immediate change to a permanent password. This requirement is not applicable to service account passwords (e.g. shared secrets, pre-shared keys) or the account of last resort.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- SRG-APP-000175-AAA-000570
- Vuln IDs
-
- V-80925
- Rule IDs
-
- SV-95635r1_rule
Checks: C-80663r1_chk
Verify AAA Services are configured to only accept certificates issued by a DoD-approved Certificate Authority for PKI-based authentication. If AAA Services are not configured to only accept certificates issued by a DoD-approved Certificate Authority, this is a finding.
Fix: F-87781r1_fix
Configure AAA Services to only accept certificates issued by a DoD-approved Certificate Authority for PKI-based authentication.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- SRG-APP-000175-AAA-000580
- Vuln IDs
-
- V-80927
- Rule IDs
-
- SV-95637r1_rule
Checks: C-80665r1_chk
Verify AAA Services are configured to reflect certificates that have been revoked for PKI-based authentication. If AAA Services are not configured to reject certificates that have been revoked, this is a finding.
Fix: F-87783r1_fix
Configure AAA Services to not accept certificates that have been revoked for PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-AAA-000590
- Vuln IDs
-
- V-80929
- Rule IDs
-
- SV-95639r1_rule
Checks: C-80667r1_chk
Verify AAA Services are configured to enforce authorized access to the corresponding private key for PKI-based authentication. If AAA Services are not configured to enforce authorized access to the corresponding private key, this is a finding.
Fix: F-87785r1_fix
Configure AAA Services to enforce authorized access to the corresponding private key for PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-AAA-000600
- Vuln IDs
-
- V-80931
- Rule IDs
-
- SV-95641r1_rule
Checks: C-80669r1_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to map the authenticated identity to the user account for PKI-based authentication. If AAA Services are not configured to map the authenticated identity to the user account, this is a finding.
Fix: F-87787r1_fix
Configure AAA Services to map the authenticated identity to the user account for PKI-based authentication.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-001199
- Version
- SRG-APP-000231-AAA-000610
- Vuln IDs
-
- V-80933
- Rule IDs
-
- SV-95643r1_rule
Checks: C-80671r1_chk
Verify AAA Services are configured to protect the confidentiality and integrity of all information at rest. AAA Services may leverage the capability of an operating system or purpose-built module for this purpose. Potential locations include the local file system where configurations and events are stored or in a related database table. If AAA Services are not configured to protect the confidentiality and integrity of all information at rest, this is a finding.
Fix: F-87789r1_fix
Configure AAA Services to protect the confidentiality and integrity of all information at rest. AAA Services may leverage the capability of an operating system or require the use of a purpose-built module for this purpose. Potential locations include the local file system where configurations and events are stored or in a related database table.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000620
- Vuln IDs
-
- V-80935
- Rule IDs
-
- SV-95645r1_rule
Checks: C-80673r1_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are not configured with shared accounts. Identify group profile definitions that do not meet the accounts user-id naming convention. Below is a super-user example of how an SA profile may be associated. Group Profile Information group = super-user{ profile_id = 40 profile_cycle = 1 service=shell { default cmd=permit cmd=debug { deny all permit .* } } } Below is an example of the user definition that should be assigned with a valid ID (not rtr-geek). Look for group accounts here: user = rtr-geek{ profile_id = 45 profile_cycle = 1 member = rtr_super password = des "********" } If AAA Services are configured with shared accounts (group profiles), this is a finding.
Fix: F-87791r2_fix
Configure AAA Services with no shared accounts. Remove all group profiles.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000630
- Vuln IDs
-
- V-80937
- Rule IDs
-
- SV-95647r1_rule
Checks: C-80675r1_chk
If AAA Services are not used for authentication of privileged users to AAA Services, this is not applicable. Verify AAA Services are configured to connect to the management network. Confirm AAA Services are not dual-homed by physically inspecting the physical LAN connection. If AAA Services are configured to connect to a non-management network, this is a finding.
Fix: F-87793r1_fix
Configure AAA Services used to authenticate privileged users for device management to connect to the management network.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000640
- Vuln IDs
-
- V-80939
- Rule IDs
-
- SV-95649r1_rule
Checks: C-80677r1_chk
If AAA Services are not used for 802.1x authentication or to authenticate privileged users for device management, this is not applicable. Verify AAA Services are configured to use a unique shared secret with clients requesting authentication services. The shared secret is to be the same for communication between AAA Services and the client devices. All shared secrets must meet password complexity requirements. If AAA Services are not configured to use a unique shared secret for communication with clients requesting authentication services, this is a finding.
Fix: F-87795r1_fix
Configure AAA Services to use a unique shared secret for communication (i.e. RADIUS, TACACS+) with all clients requesting authentication services.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000650
- Vuln IDs
-
- V-80941
- Rule IDs
-
- SV-95651r1_rule
Checks: C-80679r1_chk
If AAA Services are not used for 802.1x authentication or to authenticate privileged users for device management, this is not applicable. Verify AAA Services are configured to use IP segments separate from production VLAN IP segments. If AAA Services are not configured to use IP segments separate from production VLAN IP segments, this is a finding.
Fix: F-87797r1_fix
Configure AAA Services to use IP segments separate from production VLAN IP segments.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000660
- Vuln IDs
-
- V-80943
- Rule IDs
-
- SV-95653r1_rule
Checks: C-80681r1_chk
If AAA Services are not used for 802.1x authentication or to authenticate privileged users for device management, this is not applicable. Verify AAA Services are configured to place non-authenticated network access requests in the Unauthorized VLAN or the Guest VLAN with limited access. If the SA has created a dynamic Unauthorized VLAN, definitions should not have an IP pool assignment. Ensure the Unauthorized VLAN is configured without IP or a Guest VLAN is defined with limited access. If AAA Services are not configured to place non-authenticated network access requests in the Unauthorized VLAN or the Guest VLAN with limited access, this is a finding.
Fix: F-87799r1_fix
Configure AAA Services to place non-authenticated network access requests in the Unauthorized VLAN without access to production data. Implement a NAC solution where the device remains without IP assignment if authentication fails or create a dynamic Unauthorized VLAN/Guest VLAN with limited access in AAA server. If a Guest VLAN is built, it should not have access to production data.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-AAA-000670
- Vuln IDs
-
- V-80945
- Rule IDs
-
- SV-95655r1_rule
Checks: C-80683r1_chk
Determine if AAA Services are configured to disable non-essential modules. If AAA Services are not configured to disable non-essential modules, this is a finding.
Fix: F-87801r1_fix
Configure AAA Services to disable non-essential modules.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-AAA-000680
- Vuln IDs
-
- V-80947
- Rule IDs
-
- SV-95657r1_rule
Checks: C-80685r1_chk
Review the AAA Services configuration to ascertain if it prohibits or restricts the use of organization-defined functions, ports, protocols, and/or services. Further determine if the use is as defined in the PPSM CAL and vulnerability assessments. If AAA Services are not configured in accordance with the PPSM CAL and vulnerability assessments, this is a finding.
Fix: F-87803r1_fix
Configure AAA Services to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AAA-000690
- Vuln IDs
-
- V-80949
- Rule IDs
-
- SV-95659r1_rule
Checks: C-80687r1_chk
Determine if AAA Services are configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If AAA Services are not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-87805r1_fix
Configure the network device to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-AAA-000040
- Vuln IDs
-
- V-80951
- Rule IDs
-
- SV-95661r1_rule
Checks: C-80689r1_chk
If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. Verify AAA Services are configured to automatically remove temporary user accounts after 72 hours. If the AAA Services configuration does not automatically remove temporary user accounts after 72 hours, this is a finding.
Fix: F-87807r1_fix
Configure AAA Services to automatically remove temporary user accounts after 72 hours.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- SRG-APP-000171-AAA-000510
- Vuln IDs
-
- V-80953
- Rule IDs
-
- SV-95663r1_rule
Checks: C-80691r2_chk
Where passwords are used, verify AAA Services are configured to encrypt locally stored credentials using a FIPS-validated cryptographic module. AAA Services may leverage the capability of an operating system or purpose-built module for this purpose. Confirm that databases, configuration files, and log files have encrypted representations for all passwords, and that no password strings are readable/discernable. Potential locations include the local file system where configurations and events are stored, or in a related database table. Review AAA Services configuration for use of the MD5 algorithm to create password hashes. If AAA Services are not configured to encrypt locally stored credentials using a FIPS-validated cryptographic module, this is a finding. If AAA Services are configured to use MD5 to create password hashes, this is a finding. Note: FIPS-validated cryptographic modules are listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
Fix: F-87809r2_fix
Configure AAA Services to encrypt locally stored credentials using a FIPS-validated cryptographic module. Configure all associated databases, configuration files, and audit files to use only encrypted representations for all passwords and so that no password strings are readable/discernable.