JUSX-DM-000112 - The Juniper SRX Services Gateway must ensure SSH is disabled for root user logon to prevent remote access using the root account.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Since the identity of the root account is well-known for systems based upon Linux or UNIX and this account does not have a setting to limit access attempts, there is risk of a brute force attack on the password. Root access would give superuser access to an attacker. Preventing attackers from remotely accessing management functions using root account mitigates the risk that unauthorized individuals or processes may gain superuser access to information or privileges.

A separate account should be used for access and then the administrator can sudo to root when necessary.

Solution

From the configuration mode, enter the following commands to disable root-login using SSH.

[edit]
set system services ssh root-login deny

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000382, Rule-ID|SV-223212r513325_rule, STIG-ID|JUSX-DM-000112, STIG-Legacy|SV-80993, STIG-Legacy|V-66503, Vuln-ID|V-223212

Plugin: Juniper

Control ID: 08ff3bb6f3771d8a64dfd7fe21219855242241418765d7c21c13cf2bec873290