STIGQter STIGQter: STIG Summary: WLAN Controller Security Technical Implementation Guide (STIG) Version: 6 Release: 15 Benchmark Date: 26 Apr 2019:

Unauthorized accounts must not be configured for access to the network device.

DISA Rule

SV-3058r5_rule

Vulnerability Number

V-3058

Group Title

Unauthorized accounts are configured to access device.

Rule Version

NET0470

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove any account configured for access to the network device that is not defined in the organization's responsibilities list.

Check Contents

Review the organization's responsibilities list and reconcile the list of authorized accounts with those accounts defined for access to the network device.

If an unauthorized account is configured for access to the device, this is a finding.

Vulnerability Number

V-3058

Documentable

False

Rule Version

NET0470

Severity Override Guidance

Review the organization's responsibilities list and reconcile the list of authorized accounts with those accounts defined for access to the network device.

If an unauthorized account is configured for access to the device, this is a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

1538

Comments