JUSX-DM-000097 - The Juniper SRX Services Gateway must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.

Information

Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is a particularly important protection against the insider threat. Audit records for administrator accounts access to the organization's network devices can be more readily analyzed for trends and anomalies. The alternative method of defining administrator accounts on each device exposes the device configuration to remote access authentication attacks and system administrators with multiple authenticators for each network device.

The Juniper SRX supports three methods of user authentication: local password authentication, Remote Authentication Dial-In User Service (RADIUS), and Terminal Access Controller Access Control System Plus (TACACS+). RADIUS and TACACS+ are remote access methods used for management of the Juniper SRX. The local password method will be configured for use only for the account of last resort; however, it will not be used for remote and nonlocal access or this will result in a CAT 1 finding (CCI-000765).

This requirement references identification and authentication and does not prevent the configuration of privileges using the remote template account (CCI-000213).

Solution

Configure the Juniper SRX to forward logon requests to a RADIUS or TACACS+. Remove local users configured on the device (CCI-000213) so the AAA server cannot default to using a local account.

[edit]
set system tacplus-server address <server ipaddress> port 1812 secret <shared secret>

or

[edit]
set system radius-server address <server ipaddress> port 1812 secret <shared secret>

Note: DOD policy is that redundant AAA servers are required to mitigate the risk of a failure of the primary AAA device.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y24M10_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-2(1), 800-53|AC-2(4), 800-53|CM-6b., CAT|I, CCI|CCI-000015, CCI|CCI-000366, CCI|CCI-002132, Rule-ID|SV-229025r1015761_rule, STIG-ID|JUSX-DM-000097, STIG-Legacy|SV-80939, STIG-Legacy|V-66449, Vuln-ID|V-229025

Plugin: Juniper

Control ID: 56ebaa8b671300d6d14f4b11ca21ce4c5ac8296bde7c1dd1d5e4c6a0e286e728