STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to F5 BIG-IP Device Management Security Technical Implementation Guide

V-217385

CAT II (Medium)

The BIG-IP appliance must automatically audit account-disabling actions.

Rule ID

SV-217385r960783_rule

STIG

F5 BIG-IP Device Management Security Technical Implementation Guide

Version

V2R4

CCIs

CCI-001404

Discussion

Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account disabling actions will support account management procedures. When device management accounts are disabled, user or service accessibility may be affected. Auditing also ensures authorized active accounts remain enabled and available for use when required.

Check Content

Verify the BIG-IP appliance is configured to use a remote authentication server that automatically audits account-disabling actions. 

Verify the BIG-IP appliance is configured to use a properly configured authentication server. 

Navigate to the BIG-IP System manager >> System >> Users >> Authentication.

Verify "Authentication: User Directory" is configured to use an approved remote authentication server that automatically audits account-disabling actions.

If account disabling is not automatically audited, this is a finding.

Fix Text

Configure the BIG-IP appliance to use an approved authentication server that automatically audits account-disabling actions.