The Cisco switch must be configured to automatically audit account enabling actions.
An XCCDF Rule
Description
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply enable a new or disabled account. Notification of account enabling is one method for mitigating this risk. A comprehensive account management process will ensure an audit trail which documents the creation of application user accounts and notifies administrators and Information System Security Officers (ISSO). Such a process greatly reduces the risk that accounts will be surreptitiously created and provides logging that can be used for forensic purposes.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-220494r961290_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
Configure the switch to log account enabling using the following steps:
Step 1: Configure the AAA servers as shown in the example below:
SW1(config)# radius-server host 10.1.48.10
SW1(config)# radius-server host 10.1.48.12