STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE 3PAR StoreServ 3.2.x Security Technical Implementation Guide

V-237826

CAT I (High)

User credentials which would allow remote access to the system by the Service Processor must be removed from the storage system.

Rule ID

SV-237826r647903_rule

STIG

HPE 3PAR StoreServ 3.2.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000877

Discussion

Failure to remove the default user accounts associated with remote access from the Service Processor increases the risk of unauthorized access to the 3PAR OS via the product's remote support interface. The Service Processor's authentication methods have not been evaluated and using such mechanisms to permit remote, full control of the system by organizational or non-organizational users represents an increased risk to unauthorized access. The Service Processor can also send system data offsite providing access to system information to non-DoD organizations.

Check Content

Verify Service Processor credentials are not present.

cli% showuser

If any of the users, "3parbrowse", "3paredit", or "3parservice" exist, this is a finding

Fix Text

Remove the Service Processor credentials from the storage system. Enter the following command:

cli% removespcredential

Note: This removes the "3paredit", "3parbrowse", and "3parservice" users, and sets the "3parsvc" password to a new random value.