STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Axonius Federal Systems Ax-OS Security Technical Implementation Guide

V-276005

CAT II (Medium)

Ax-OS must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

Rule ID

SV-276005r1122665_rule

STIG

Axonius Federal Systems Ax-OS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000213CCI-000778CCI-001082CCI-001084CCI-002235CCI-002233CCI-002165CCI-001813CCI-001774CCI-002696CCI-002699CCI-003638CCI-003639CCI-003640CCI-003641CCI-003642

Discussion

Strong access controls are critical to securing the application server. The application server must employ access control policies (e.g., identity-based, role-based, and attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control matrices, and cryptography) to control access between users (or processes acting on behalf of users) and objects (e.g., applications, files, records, processes, and application domains) in the application server. Without stringent logical access and authorization controls, an adversary may have the ability, with little effort, to compromise the application server and associated supporting infrastructure. Satisfies: SRG-APP-000033, SRG-APP-000158, SRG-APP-000211, SRG-APP-000233, SRG-APP-000340, SRG-APP-000342, SRG-APP-000328, SRG-APP-000380, SRG-APP-000386, SRG-APP-000472, SRG-APP-000473, SRG-APP-000715, SRG-APP-000720, SRG-APP-000725, SRG-APP-000730, SRG-APP-000735

Check Content

Role-Based Access Control hierarchy is to be defined by the authorizing official (AO). Separation of duties must be configured.

Select the gear icon (System Settings) >> Access Management >> LDAP & SAML.

Depending on the multifactor type configured, under LDAP or SAML, locate "User Assignment Settings".

If only one assigned role exists, this is a finding.

Fix Text

Role-Based Access Control hierarchy is to be defined by the AO. Separation of duties must be configured.

Select the gear icon (System Settings) >> Access Management >> LDAP & SAML.

Depending on the multifactor type configured, under LDAP or SAML, locate "User Assignment Settings".

Assign two or more roles as defined by the AO and tie them to an LDAP/SAML user or group.