Details
Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by logging connection activities of remote users.
Examples of policy requirements include, but are not limited to, authorizing remote access to the information system, limiting access based on authentication credentials, and monitoring for unauthorized access.
Satisfies: SRG-APP-000315-AS-000094, SRG-APP-000380-AS-000088, SRG-APP-000133-AS-000092, SRG-APP-000033-AS-000024, SRG-APP-000153-AS-000104
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
From administrative console, navigate to Users and Groups >> Administrative group roles.
Note: names of the groups and the roles assigned to each group.
Navigate back to User and Groups >> Manage Groups.
Click on every group.
For each group, click on users.
If there is any user who does not belong to the group based on the roles assigned to the group, click on the checkbox next to the user.
Click ‘Remove’.
Restart the DMGR and all the JVMs.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control, Configuration Management, Identification and Authentication.This control applies to the following type of system Unix.
References
- 800-53|AC-3
- 800-53|AC-17(1)
- 800-53|CM-5(1)
- 800-53|CM-5(6)
- 800-53|IA-2(5)
- CAT|II
- CCI|CCI-000213
- CCI|CCI-000770
- CCI|CCI-001499
- CCI|CCI-001813
- CCI|CCI-002314
- Rule-ID|SV-95927r1_rule
- STIG-ID|WBSP-AS-000150
- Vuln-ID|V-81213