JUEX-NM-000030 - The Juniper EX switch must be configured to automatically audit account modification.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Because the accounts in the network device are privileged, or system-level accounts, account management is vital to the security of the network device. Account management by a designated authority ensures access to the network device is being controlled in a secure manner by only granting access to authorized personnel with the appropriate and necessary privileges.

Auditing account modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed. If modifications to management accounts are not audited, reconciliation of account management procedures cannot be tracked.

Solution

Configure the network device or its associated authentication server to automatically audit the modification of accounts.

set system syslog host <IPv4 or IPv6 syslog address> change-log info
set system syslog host <IPv4 or IPv6 syslog address> interactive-commands info
-or-
set system syslog host <IPv4 or IPv6 syslog address> any info

set system syslog file <file name> change-log info
set system syslog file <file name> interactive-commands info
-or-
set system syslog file <file name> any info

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_EX_Switches_Y23M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001403, Rule-ID|SV-253880r879526_rule, STIG-ID|JUEX-NM-000030, Vuln-ID|V-253880

Plugin: Juniper

Control ID: be37cb68285c9c078390aa7bafbeb1d7e8865a737a9bb516b16bcbdeeaa44155