F5BI-DM-000015 - The BIG-IP appliance must automatically remove or disable temporary user accounts after 72 hours.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Temporary accounts are established as part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. If temporary accounts remain active when no longer needed, they may be used to gain unauthorized access. The risk is greater for the network device since these accounts have elevated privileges. To mitigate this risk, automated termination of all temporary accounts must be set upon account creation.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the BIG-IP appliance to use an approved remote authentication server that automatically removes or disables temporary user accounts after 72 hours.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_11-x_Y23M11_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000016, CCI|CCI-000366, Rule-ID|SV-228979r879887_rule, STIG-ID|F5BI-DM-000015, STIG-Legacy|SV-74527, STIG-Legacy|V-60097, Vuln-ID|V-228979

Plugin: F5

Control ID: 55bbd092b3b233917ef445acda682bb4d204b0caee33e96298e91e72c85b542a