STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AC-3 (7) — Access Enforcement

CCI-002169

Definition

Enforce a role-based access control policy over defined subjects and objects based upon organization-defined roles and users authorized to assume such roles.

Parent Control

AC-3 (7)Access EnforcementAccess Control

Linked STIG Checks (24)

V-278966CAT IIThe application server must enforce a role-based access control (RBAC) policy over defined subjects and objects.Application Server Security Requirements GuideV-255957CAT IIIf the Arista network device uses role-based access control, the network device must enforce organization-defined role-based access control policies over defined subjects and objects.Arista MLS EOS 4.X NDM Security Technical Implementation GuideV-271927CAT IThe Cisco ACI must be configured to assign appropriate user roles or access levels to authenticated users.Cisco ACI NDM Security Technical Implementation GuideV-269790CAT IThe Dell OS10 Switch must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.Dell OS10 Switch NDM Security Technical Implementation GuideV-217411CAT IIThe BIG-IP appliance must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.F5 BIG-IP Device Management Security Technical Implementation GuideV-266067CAT IThe F5 BIG-IP appliance must be configured to assign appropriate user roles or access levels to authenticated users.F5 BIG-IP TMOS NDM Security Technical Implementation GuideV-230954CAT IIIf the network device uses role-based access control, Forescout must enforce organization-defined, role-based access control policies over defined subjects and objects.Forescout Network Device Management Security Technical Implementation GuideV-278974CAT IIThe operating system must enforce a role-based access control (RBAC) policy over defined subjects and objects.General Purpose Operating System Security Requirements GuideV-217461CAT IIIf the HP FlexFabric Switch uses role-based access control, the HP FlexFabric Switch must enforce organization-defined role-based access control policies over defined subjects and objects.HP FlexFabric Switch NDM Security Technical Implementation GuideV-266948CAT IIAOS must enforce role-based access control policies over defined subjects and objects.HPE Aruba Networking AOS NDM Security Technical Implementation GuideV-268223CAT IIIf the HYCU virtual appliance uses role-based access control, it must enforce organization-defined role-based access control policies over defined subjects and objects.HYCU Protege Security Technical Implementation GuideV-65137CAT IIIf the DataPower Gateway uses role-based access control, the DataPower Gateway must enforce role-based access control policies over defined subjects and objects.IBM DataPower Network Device Management Security Technical Implementation GuideV-258600CAT IThe ICS must be configured to prevent nonprivileged users from executing privileged functions.Ivanti Connect Secure NDM Security Technical Implementation GuideV-253916CAT IIThe Juniper EX switch must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.Juniper EX Series Switches Network Device Management Security Technical Implementation GuideV-202092CAT IIIf the network device uses role-based access control, the network device must enforce organization-defined role-based access control policies over defined subjects and objects.Network Device Management Security Requirements GuideV-256079CAT IThe Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.Riverbed NetProfiler Security Technical Implementation GuideV-281380CAT IITCMax must enforce a role-based access control (RBAC) policy over defined subjects and objects.Soaring Software Solutions TCMax 9.x Security Technical Implementation GuideV-279251CAT IThe Edge SWG must be configured to use at least two authentication servers for the purpose of authenticating users prior to granting administrative access.Symantec Edge SWG NDM Security Technical Implementation GuideV-94685CAT IISymantec ProxySG must use Role-Based Access Control (RBAC) to assign privileges to users for access to files and functions.Symantec ProxySG NDM Security Technical Implementation GuideV-242254CAT IThe TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.Trend Micro TippingPoint NDM Security Technical Implementation GuideV-265292CAT IThe NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.VMware NSX 4.x Manager NDM Security Technical Implementation GuideV-69195CAT IIIf the NSX vCenter uses role-based access control, the network device must enforce organization-defined role-based access control policies over defined subjects and objects.VMware NSX Manager Security Technical Implementation GuideV-251778CAT INSX-T Manager must restrict the use of configuration, administration, and the execution of privileged commands to authorized personnel based on organization-defined roles.VMware NSX-T Manager NDM Security Technical Implementation GuideV-279013CAT IIThe VMM must enforce a role-based access control (RBAC) policy over defined subjects and objects.Virtual Machine Manager Security Requirements Guide