Check: APCG-00-000015
      
      
        
  AvePoint Compliance Guardian STIG:
  APCG-00-000015
  
    (in version v1 r1)
  
      
      
    
  Title
Compliance Guardian must provide automated mechanisms for supporting account management functions. (Cat II impact)
Discussion
Remote access (e.g., Remote Desktop Protocol [RDP]) is access to DOD nonpublic information systems by an authorized user (or an information system) communicating through an external, nonorganization-controlled network. Remote access methods include dial-up, broadband, and wireless. Satisfies: SRG-APP-000023, SRG-APP-000025, SRG-APP-000065, SRG-APP-000163, SRG-APP-000164, SRG-APP-000165, SRG-APP-000166, SRG-APP-000167, SRG-APP-000168, SRG-APP-000169, SRG-APP-000170, SRG-APP-000171, SRG-APP-000173, SRG-APP-000174, SRG-APP-000190, SRG-APP-000234, SRG-APP-000291, SRG-APP-000292, SRG-APP-000293, SRG-APP-000294, SRG-APP-000295, SRG-APP-000318, SRG-APP-000319, SRG-APP-000320, SRG-APP-000345, SRG-APP-000397, SRG-APP-000401, SRG-APP-000503, SRG-APP-000505, SRG-APP-000506, SRG-APP-000509
Check Content
Compliance Guardian supports integration with Active Directory (AD) for automated account management. Check the Compliance Guardian configuration to ensure AD Integration is enabled. - Log on to Compliance Guardian with admin account. - On the Control Panel page in the General Security section, click "Authentication Manager". - Navigate to "AD Integration". - Verify that the "AD Integration" option is enabled. If the AD Integration option is not enabled, this is a finding.
Fix Text
Configure the Compliance Guardian configuration to ensure AD Integration is enabled. - Log on to Compliance Guardian with admin account. - On the Control Panel page in the Authentication Manager section, click "Authentication Manager". - Navigate to "AD Integration". - Set the Action of "AD Integration" to "Enable". - Save settings. Add AD user or group to Compliance Guardian by Account Manager; realize automated mechanisms through AD account management functions.
Additional Identifiers
Rule ID: SV-256842r890136_rule
Vulnerability ID: V-256842
Group Title: SRG-APP-000023
Expert Comments
      
        
        
      
      
        
  CCIs
      
      
        
        
      
    
  | Number | Definition | 
|---|---|
| CCI-000015 | Support the management of system accounts using organization-defined automated mechanisms. | 
| CCI-000017 | Disable accounts when the accounts have been inactive for the organization-defined time-period. | 
| CCI-000044 | Enforce the organization-defined limit of consecutive invalid logon attempts by a user during the organization-defined time period. | 
| CCI-000172 | Generate audit records for the event types defined in AU-2 c that include the audit record content defined in AU-3. | 
| CCI-000192 | The information system enforces password complexity by the minimum number of upper case characters used. | 
| CCI-000193 | The information system enforces password complexity by the minimum number of lower case characters used. | 
| CCI-000194 | The information system enforces password complexity by the minimum number of numeric characters used. | 
| CCI-000195 | The information system, for password-based authentication, when new passwords are created, enforces that at least an organization-defined number of characters are changed. | 
| CCI-000196 | The information system, for password-based authentication, stores only cryptographically-protected passwords. | 
| CCI-000198 | The information system enforces minimum password lifetime restrictions. | 
| CCI-000199 | The information system enforces maximum password lifetime restrictions. | 
| CCI-000200 | The information system prohibits password reuse for the organization-defined number of generations. | 
| CCI-000205 | The information system enforces minimum password length. | 
| CCI-000795 | The organization manages information system identifiers by disabling the identifier after an organization-defined time period of inactivity. | 
| CCI-001133 | Terminate the network connection associated with a communications session at the end of the session or after an organization-defined time period of inactivity. | 
| CCI-001619 | The information system enforces password complexity by the minimum number of special characters used. | 
| CCI-001682 | Automatically remove or disable emergency accounts after an organization-defined time period for each type of account. | 
| CCI-001683 | The information system notifies organization-defined personnel or roles for account creation actions. | 
| CCI-001684 | The information system notifies organization-defined personnel or roles for account modification actions. | 
| CCI-001685 | The information system notifies organization-defined personnel or roles for account disabling actions. | 
| CCI-001686 | The information system notifies organization-defined personnel or roles for account removal actions. | 
| CCI-001991 | The information system, for PKI-based authentication, implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network. | 
| CCI-002041 | The information system allows the use of a temporary password for system logons with an immediate change to a permanent password. | 
| CCI-002130 | Automatically audit account enabling actions. | 
| CCI-002132 | The information system notifies organization-defined personnel or roles for account enabling actions. | 
| CCI-002145 | Enforce organization-defined circumstances and/or usage conditions for organization-defined system accounts. | 
| CCI-002238 | Automatically lock the account or node for either an organization-defined time period, until the locked account or node is released by an administrator, or delays the next logon prompt according to the organization-defined delay algorithm when the maximum number of unsuccessful logon attempts is exceeded. | 
| CCI-002361 | Automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect. | 
      
        
        
      
      
        
  Controls
      
      
        
        
      
    
  | Number | Title | 
|---|---|
| AC-2(1) | Automated System Account Management | 
| AC-2(2) | Automated Temporary and Emergency Account Management | 
| AC-2(3) | Disable Accounts | 
| AC-2(4) | Automated Audit Actions | 
| AC-2(11) | Usage Conditions | 
| AC-7 | Unsuccessful Logon Attempts | 
| AC-12 | Session Termination | 
| AU-12 | Audit Record Generation | 
| SC-10 | Network Disconnect |