Free DISA STIG and SRG Library | Vaulted

V-3057

Authorized accounts must be assigned the least privilege level necessary to perform assigned duties.

Finding ID
NET0465
Rule ID
SV-15471r3_rule15471r4_rule
Severity
Cat II
CCE
(None)
Group Title
Accounts assigned least privileges necessary to perform duties.
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

By not restricting authorized accounts to their proper privilege level, access to restricted functions may be allowed before authorized personell are trained or experienced enough to use those functions. Network disruptions or outages may occur due to mistakes made by inexperienced persons using accounts with greater privileges than necessary.

Fix Text

Configure authorized accounts with the least privilege rule. Each user will have access to only the privileges they require to perform their assigned duties.

Check Content

Review the accounts authorized for access to the network device. Determine if the accounts are assigned the lowest privilege level necessary to perform assigned duties. User accounts must be set to a specific privilege level which can be mapped to specific commands or a group of commands. Authorized accounts should have the greatestleast privilege level unless deemed necessary for assigned duties. If it is determined that authorized accounts are assigned to greater privileges than necessary, this is a finding. Below is an example of assigning a privilege level to a local user account and changing the default privilege level of the configure terminal command. username junior-engineer1 privilege 7 password xxxxxx privilege exec level 7 configure terminal The above example only covers local accounts. You will also need to check the accounts and their associated privilege levels configured in the authentication server. You can also use TACACS+ for even more granularity at the command level as shown in the following example: user = junior-engineer1 { password = clear "xxxxx" service = shell { set priv-lvl = 7 } }

Responsibility

Information Assurance Officer

IA Controls

ECSC-1