CCI-002169
Enforce a role-based access control policy over defined subjects and objects based upon organization-defined roles and users authorized to assume such roles.
If the HP FlexFabric Switch uses role-based access control, the HP FlexFabric Switch must enforce organization-defined role-based access control policies over defined subjects and objects.
1 rule found Severity: Medium

If the HYCU Server or Web UI uses discretionary access control, the network device must enforce organization-defined discretionary access control policies over defined subjects and objects.
1 rule found Severity: Medium

If the DataPower Gateway uses role-based access control, the DataPower Gateway must enforce role-based access control policies over defined subjects and objects.
1 rule found Severity: Medium

Symantec ProxySG must use Role-Based Access Control (RBAC) to assign privileges to users for access to files and functions.
1 rule found Severity: Medium

The BIG-IP appliance must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.
1 rule found Severity: Medium

If the Arista network device uses role-based access control, the network device must enforce organization-defined role-based access control policies over defined subjects and objects.
1 rule found Severity: Medium

The F5 BIG-IP appliance must be configured to assign appropriate user roles or access levels to authenticated users.
1 rule found Severity: High

1 rule found Severity: High

The Juniper EX switch must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.
1 rule found Severity: Medium

If the network device uses role-based access control, the network device must enforce organization-defined role-based access control policies over defined subjects and objects.
1 rule found Severity: Medium

The Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.
1 rule found Severity: High

The TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.
1 rule found Severity: High

The Dell OS10 Switch must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
1 rule found Severity: High

If the network device uses role-based access control, Forescout must enforce organization-defined, role-based access control policies over defined subjects and objects.
1 rule found Severity: Medium

1 rule found Severity: Medium

If the HYCU virtual appliance uses role-based access control, it must enforce organization-defined role-based access control policies over defined subjects and objects.
1 rule found Severity: Medium

The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.
1 rule found Severity: High
