Check: 1.008
Windows 7 STIG:
1.008
(in versions v1 r32 through v1 r25)
Title
Shared user accounts must not be permitted on the system. (Cat II impact)
Discussion
Shared accounts (accounts where two or more people log on with the same user identification) do not provide adequate identification and authentication. There is no way to provide for non-repudiation or individual accountability for system access and resource usage.
Check Content
Determine if any shared accounts exist. If no shared accounts exist, this is NA. Any shared account must be documented with the ISSO. Documentation must include the reason for the account, who has access to this account, and how the risk of using a shared account (which provides no individual identification and accountability) is mitigated. If such documentation does not exist, or is not current, this is a finding. Note: As an example, a shared account may be permitted for a help desk or a site security personnel machine, if that machine is standalone and has no access to the network.
Fix Text
Create or update shared accounts documentation that minimally contains the name of the shared account(s), the system(s) on which the accounts exist, and the individuals who have access to the accounts. Remove any shared accounts that do not meet the requirements.
Additional Identifiers
Rule ID: SV-25000r2_rule
Vulnerability ID: V-1072
Group Title: Shared User Accounts
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000764 |
Uniquely identify and authenticate organizational users and associate that unique identification with processes acting on behalf of those users. |
Controls
Number | Title |
---|---|
IA-2 |
Identification and Authentication (organizational Users) |