Details
Changes to any software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network device for implementing any changes or upgrades. If the network device were to enable non-authorized users to make changes to software libraries, those changes could be implemented without undergoing testing, validation, and approval.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Configure one or more classes as shown in the example below whose users will not be permitted to add, change, or delete software installed on the router.
[edit system]
set login class JR_ENGINEER permissions all
set login class JR_ENGINEER deny-commands ‘(request system software)’
Note: The predefined classes ‘operator’ and ‘Read-only’ do not have permissions to install or delete software.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Juniper.
References
- 800-53|CM-5(6)
- CAT|II
- CCI|CCI-001499
- Rule-ID|SV-101223r1_rule
- STIG-ID|JUNI-ND-000460
- Vuln-ID|V-91123