Details
Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account must be bound to a user certificate when PKI-based authentication is implemented.
This requirement applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management).
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
If the BIG-IP APM module provides PKI-based, user authentication intermediary services, configure a profile in the BIG-IP APM module to map the authenticated identity to the user account for PKI-based authentication.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system F5.
References
- 800-53|IA-5(2)(c)
- CAT|II
- CCI|CCI-000187
- Rule-ID|SV-215722r557355_rule
- STIG-ID|F5BI-AP-000085
- STIG-Legacy|SV-74465
- STIG-Legacy|V-60035
- Vuln-ID|V-215722