2.7 Ensure remote access capabilities for the User-ID service account are forbidden.

Information

Restrict the User-ID service account's ability to gain remote access into the organization. This capability could be made available through a variety of technologies, such as VPN, Citrix GoToMyPC, or TeamViewer. Remote services that integrate authentication with the organization's Active Directory may unintentionally allow the User-ID service account to gain remote access.
Rationale:
In the event of a compromised User-ID service account, restricting the account's ability to remotely access resources within the organization's internal network reduces the impact of a service account compromise.

NOTE: Nessus has not performed this check. The Active Directory LDAP type does not appear to be used. This check is included for informational purposes

Solution

Remove this account from all groups that might grant remote access to the network, or to any network services or hosts. Remediation is operating-system dependent. For instance, in Windows Active Directory, this account should be removed from any group that grants the account access to VPN or Wireless access. In addition, domain administrative accounts by default have remote desktop (RDP) access to all domain member workstations - this should be explicitly denied for this account.
Default Value:
Not configured

See Also

https://workbench.cisecurity.org/files/1664

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CSCv6|16

Plugin: Palo_Alto

Control ID: 59721598a0152cbede7f7953803014e3839c9e51ba1e8f28627e0f17614f0100