2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabled

Information

If User-ID is configured, use the Include/Exclude Networks section to limit the User-ID scope to operate only on trusted networks. There is rarely a legitimate need to allow WMI probing on an untrusted network.
Rationale:
The Include/Exclude Networks feature allow users to configure boundaries for the User-ID service. By using the feature to limit User-ID probing to only trusted internal networks, the risks of privileged information disclosure through sent probes can be reduced. Note that if an entry appears in the Include/Exclude Networks section, an implicit exclude-all-networks policy will take effect for all other networks.

Solution

Navigate to Device > User Identification > User Mapping > Include/Exclude Networks.
Set all trusted internal networks to have a Discovery value of Include.
Set all untrusted external networks to have a Discovery value of Exclude. Note that any value in the trusted networks list implies that all other networks are untrusted.
Impact:
Not restricting the networks subject to User Identification means that the administrative credentials (userid and password hash) used for this task will transit untrusted networks, or be sent to untrusted hosts. Capturing these credentials exposes them to offline cracking attacks.
Default Value:
Not configured

See Also

https://workbench.cisecurity.org/files/2104

Item Details

Category: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

References: 800-53|AC-2, 800-53|AC-2(12), 800-53|AU-3, 800-53|AU-12, 800-53|CM-7b., CSCv6|6.5, CSCv6|9.1, CSCv6|16, CSCv6|16.10, CSCv7|6.2, CSCv7|9.2, CSCv7|16, CSCv7|16.13

Plugin: Palo_Alto

Control ID: bc2e68750942ac56c70dc81319a4a0b6c7e34ff1f466ee660f2cd81ab5ffc2fe