1.4.1.3 Ensure known default accounts do not exist

Information

Deletes the known default accounts configured

Rationale:

In order to attempt access to known devices' platforms, attackers use the available database of the known default accounts for each platform or Operating System. The known default accounts are often (without limiting to) the following: 'root', 'asa', 'admin', 'cisco', 'pix'. When the attacker has discovered that a default account is enabled on a system, the work of attempting to access to the device will be half done given that the remaining part will be on guessing the password and risks for devices to be intruded are very high. It is a best practice to use Enterprise customized administrative accounts.

Solution

Step 1: Acquire the Enterprise customized administrative account <customized\_admin\_account> and password <admin\_password>

Step 2: Run the following to create the customized administrative account as well as the required privilege level <privilege\_level>

hostname(config)#username <customized_admin_account> password <admin_password> privilege <privilege_level>

Step 3: Run the following to delete the known default accounts identified during the audit

hostname(config)# no username <known_default_account>

Default Value:

The default username used for the first SSH connection or aaa authentication telnet console is asa but for versions from 8.4(2) and above, there is no default username

See Also

https://workbench.cisecurity.org/files/3294

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5, CSCv7|4.2

Plugin: Cisco

Control ID: e6953a77d848091564b40364715a8041f369c1a40b30b85f56f333550830ebc1