JUSX-DM-000077 - The Juniper SRX Services Gateway must implement logon roles to ensure only authorized roles are allowed to install software and updates.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Allowing anyone to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. This requirement applies to code changes and upgrades for all network devices.

For example audit admins and the account of last resort are not allowed to perform this task.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the Juniper SRX to allow only the ISSM user account (or administrators/roles appointed by the ISSM) to select which auditable events are to be audited. To ensure this is the case, each ISSM-appointed role on the AAA must be configured for least privilege using the following stanzas for each role.

[edit]
show system login

Use the delete command or retype the command to remove the permission 'Maintenance' or 'request system software add' from any class that is not authorized to upgrade software on the device. An explicitly Deny for the command 'request system software add' can also be used if some Maintenance commands are permitted.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001812, Rule-ID|SV-223202r513295_rule, STIG-ID|JUSX-DM-000077, STIG-Legacy|SV-80975, STIG-Legacy|V-66485, Vuln-ID|V-223202

Plugin: Juniper

Control ID: 6253d7b6afbdb554e16c40c2a9cdac1202056e1cd458aa1367762c82060a90a0