F5BI-DM-300010 - The F5 BIG-IP appliance must be configured to assign appropriate user roles or access levels to authenticated users.

Information

Successful identification and authentication must not automatically give an entity full access to a network device or security domain.

Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset or set of resources. Information systems use access control policies and enforcement mechanisms to implement this requirement. The F5 BIG-IP appliance must enforce organization-defined roles to control privileged access to configure the types or objects a user can manage and/or the tasks a user can perform.

For each BIG-IP user account, a different user role can be assigned to each administrative partition to which the user has access. This allows assignment of multiple user roles to each user account on the system. Users can assign a specific user role to each administrative partition to grant the user access. In this way, the BIG-IP configuration objects that the user can manage are controlled, as well as the types of actions the user can perform on those objects.

Satisfies: SRG-APP-000033-NDM-000212, SRG-APP-000329-NDM-000287

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Remote Roles (e.g., RADIUS, LDAP groups)
From the BIG-IP GUI:
1. System.
2. Users.
3. Remote Role Groups.
4. Select the Group Name.
5. Modify the Properties of the group to the appropriate access level.
6. Update.

Local Users
1. System.
2. Users.
3. User List.
4. Select the user.
5. Modify "Partition Access" to the appropriate access level.
6. Update.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_TMOS_Y25M07_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-3, 800-53|AC-3(7), 800-53|CM-6b., CAT|I, CCI|CCI-000213, CCI|CCI-000366, CCI|CCI-002169, Rule-ID|SV-266067r1024598_rule, STIG-ID|F5BI-DM-300010, Vuln-ID|V-266067

Plugin: F5

Control ID: 3eb687fd04c079cfa8db9c8366930fe277ccc51362aa6cf5febb4caa782c6d46