JUSX-DM-000115 - The Juniper SRX Services Gateway must be configured with only one local user account to be used as the account of last resort.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Without centralized management, credentials for some network devices will be forgotten, leading to delays in administration, which itself leads to delays in remediating production problems and in addressing compromises in a timely fashion. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible.

Local accounts are configured using the local password authentication method which does not meet the multifactor authentication criteria. The account of last resort is a group authenticator which does not provide nonrepudiation, thus must be used only rare cases where the device must be accessed using the local console and an individual authenticator is not possible, including when network access is not available.

Solution

If more than one account has an authentication stanza, and it is not documented, delete the authentication stanza (if the account is a template account) or the entire account (if the account is unauthorized or no longer needed).

To delete a template account:

[edit]
delete system login user <account name> authentication
commit

To delete an unneeded or unauthorized account:

[edit]
delete system login user <account name>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000382, Rule-ID|SV-223215r513334_rule, STIG-ID|JUSX-DM-000115, STIG-Legacy|SV-81001, STIG-Legacy|V-66511, Vuln-ID|V-223215

Plugin: Juniper

Control ID: d5c6f221314ba1a82e50869de8375f7bac0e4048dfc33d2dc42be158d1d223b5