STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Juniper SRX SG NDM Security Technical Implementation Guide

V-66511

CAT II (Medium)

The Juniper SRX Services Gateway must be configured with only one local user account to be used as the account of last resort.

Rule ID

SV-81001r1_rule

STIG

Juniper SRX SG NDM Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-000382

Discussion

Without centralized management, credentials for some network devices will be forgotten, leading to delays in administration, which itself leads to delays in remediating production problems and in addressing compromises in a timely fashion. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible. Local accounts are configured using the local password authentication method which does not meet the multifactor authentication criteria. The account of last resort is a group authenticator which does not provide nonrepudiation, thus must be used only rare cases where the device must be accessed using the local console and an individual authenticator is not possible, including when network access is not available.

Check Content

Verify only a single local account has an authentication stanza and that the name is the account of last resort.

[edit]
show system login

user <account of last resort> {
  uid 2001;
  class <appropriate class name>;
  authentication { <--- This stanza permits local login
    encrypted-password "$sha2$22895$aVBPaRVa$o6xIqNSYg9D7yt8pI47etAjZV9uuwHrhAFT6R021HNsy"; ## SECRET-DATA
  }
}

OR

user <template account> {
  uid 2001;
  class <appropriate class name>;
}

If accounts other than the account of last resort contain an authentication stanza, and that account is not documented, this is a finding.

Fix Text

If more than one account has an authentication stanza, and it is not documented, delete the authentication stanza (if the account is a template account) or the entire account (if the account is unauthorized or no longer needed).

To delete a template account:

[edit]
delete system login user <account name> authentication
commit

To delete an unneeded or unauthorized account:

[edit]
delete system login user <account name>