STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Axonius Federal Systems Ax-OS Security Technical Implementation Guide

V-276015

CAT II (Medium)

Ax-OS must implement privileged access authorization to all information systems and infrastructure components for selected organization-defined vulnerability scanning activities.

Rule ID

SV-276015r1122695_rule

STIG

Axonius Federal Systems Ax-OS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001067

Discussion

In certain situations, the nature of the vulnerability scanning may be more intrusive, or the information system component that is the subject of the scanning may contain highly sensitive information. Privileged access authorization to selected system components facilitates more thorough vulnerability scanning and also protects the sensitive nature of such scanning. The vulnerability scanning application must use privileged access authorization for the scanning account.

Check Content

From the Axonius Toolbox (accessed via Secure Shell [SSH]) Main Actions Menu, select the following options:

Compliance Actions >> Advanced Compliance Actions >> Update Tenable Scan Account Permissions

Enter the scanning account username.

If no scanning account has been set, this is a finding.

Fix Text

From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options:

Compliance Actions >> Advanced Compliance Actions >> Add Tenable Scan Account

Enter the username.