PANW-NM-000061 - The Palo Alto Networks security platform must prohibit the use of unencrypted protocols for network access to privileged accounts.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.

Network devices can accomplish this by making direct function calls to encryption modules or by leveraging operating system encryption capabilities.

Solution

Go to Device >> Setup >> Management
In the 'Management Interface Settings' window, select the 'Edit' icon (the gear symbol in the upper-right corner of the pane). In the 'Management Interface Settings' window, make sure that HTTP and Telnet are not checked (enabled).
If they are not checked, select either 'OK' or 'Cancel'.
If either one is checked, select the check box to disable it, then select 'OK'.
If any changes were made, commit changes by selecting 'Commit' in the upper-right corner of the screen.
Select 'OK' when the confirmation dialog appears.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_PAN_Y22M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000197, Rule-ID|SV-228655r513570_rule, STIG-ID|PANW-NM-000061, STIG-Legacy|SV-77227, STIG-Legacy|V-62737, Vuln-ID|V-228655

Plugin: Palo_Alto

Control ID: a6bd94b83a6e8b653c0ea0b42c4064dbed219a8a27603b3d842f5c0f78b7ed14