WBSP-AS-000150 - The WebSphere Application Server users in a local user registry group must be authorized for that group.

Information

Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by logging connection activities of remote users.

Examples of policy requirements include, but are not limited to, authorizing remote access to the information system, limiting access based on authentication credentials, and monitoring for unauthorized access.

Satisfies: SRG-APP-000315-AS-000094, SRG-APP-000380-AS-000088, SRG-APP-000133-AS-000092, SRG-APP-000033-AS-000024, SRG-APP-000153-AS-000104

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From administrative console, navigate to Users and Groups >> Administrative group roles.

Note: names of the groups and the roles assigned to each group.

Navigate back to User and Groups >> Manage Groups.

Click on every group.

For each group, click on users.

If there is any user who does not belong to the group based on the roles assigned to the group, click on the checkbox next to the user.

Click 'Remove'.

Restart the DMGR and all the JVMs.

See Also

http://iasecontent.disa.mil/stigs/zip/U_IBM_WebSphere_Traditional_V9-x_V1R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-3, 800-53|AC-17(1), 800-53|CM-5(1), 800-53|CM-5(6), 800-53|IA-2(5), CAT|II, CCI|CCI-000213, CCI|CCI-000770, CCI|CCI-001499, CCI|CCI-001813, CCI|CCI-002314, Rule-ID|SV-95927r1_rule, STIG-ID|WBSP-AS-000150, Vuln-ID|V-81213

Plugin: Windows

Control ID: ceaa06bd8f9ff4567062b8865b9bc1f4dc44f192c989e3e1e9658616b1f94c4b