F5BI-DM-000284 - The F5 BIG-IP must ensure SSH is disabled for root user logon to prevent remote access using the root account.

Information

The F5 BIG-IP shell must be locked down to limit the ability to modify the configuration through the shell. Preventing attackers from remotely accessing management functions using root account mitigates the risk that unauthorized individuals or processes may gain superuser access to information or privileges. Additionally, the audit records for actions taken using the group account will not identify the specific person who took the actions.

Solution

To ensure that the F5 BIG-IP meets the requirements within the STIG, limit the ability to modify the configuration at the command line. SSH into the command line interface and type in the following commands.

(tmos)# modify sys db systemauth.disablerootlogin value true
(tmos)# modify sys db systemauth.disablebash value true
(tmos)# save sys config

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_Y25M01_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-217424r1043177_rule, STIG-ID|F5BI-DM-000284, STIG-Legacy|SV-106833, STIG-Legacy|V-97729, Vuln-ID|V-217424

Plugin: F5

Control ID: f94a12416016943a2af98729ae1bd9e1bacb7a89ac9abd788c63e1f6615f06e3