NET0470 - Unauthorized accounts must not be configured for access to the network device.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

A malicious user attempting to gain access to the network device may compromise an account that may be unauthorized for use. The unauthorized account may be a temporary or inactive account that is no longer needed to access the device. Denial of Service, interception of sensitive information, or other destructive actions could potentially take place if an unauthorized account is configured to access the network device.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Remove any account configured for access to the network device that is not defined in the organization's responsibilities list.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R29_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(1), CAT|II, Rule-ID|SV-3058r5_rule, STIG-ID|NET0470, Vuln-ID|V-3058

Plugin: Juniper

Control ID: f64343fa187154ebf1f6cb289b999b27ff9ef7534e42af4e40e60930147ef30b