Microsoft Windows Server 2012/2012 R2 Member Server STIG:
(in versions v3 r5 through v2 r12)
Shared user accounts must not be permitted on the system. (Cat II impact)
Shared accounts (accounts where two or more people log in with the same user identification) do not provide adequate identification and authentication. There is no way to provide for nonrepudiation or individual accountability for system access and resource usage.
Determine whether any shared accounts exist. If no shared accounts exist, this is NA. Shared accounts, such as required by an application, may be approved by the organization. This must be documented with the ISSO. Documentation must include the reason for the account, who has access to the account, and how the risk of using the shared account is mitigated to include monitoring account activity. If unapproved shared accounts exist, this is a finding.
Remove unapproved shared accounts from the system. Document required shared accounts with the ISSO. Documentation must include the reason for the account, who has access to the account, and how the risk of using the shared account is mitigated to include monitoring account activity.
Rule ID: SV-225249r569185_rule
Vulnerability ID: V-225249
Group Title: SRG-OS-000104-GPOS-00051
The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
Identification And Authentication (Organizational Users)