Check: NET0230
WLAN Controller STIG (STIG):
NET0230
(in versions v6 r15 through v6 r12)
Title
Network devices must be password protected. (Cat I impact)
Discussion
Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organization's security policy. Access to the network must be categorized as administrator, user, or guest so the appropriate authorization can be assigned to the user requesting access to the network or a network device. Authorization requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of user identities is accomplished through the use of passwords, tokens, biometrics, or in the case of multi-factor authentication, some combination thereof. Lack of authentication enables anyone to gain access to the network or possibly a network device providing opportunity for intruders to compromise resources within the network infrastructure.
Check Content
Review the network devices configuration to determine if administrative access to the device requires some form of authentication--at a minimum a password is required. If passwords aren't used to administrative access to the device, this is a finding.
Fix Text
Configure the network devices so it will require a password to gain administrative access to the device.
Additional Identifiers
Rule ID: SV-3012r4_rule
Vulnerability ID: V-3012
Group Title: Network element is not password protected.
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |