STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE Aruba Networking AOS NDM Security Technical Implementation Guide

V-266948

CAT II (Medium)

AOS must enforce role-based access control policies over defined subjects and objects.

Rule ID

SV-266948r1039865_rule

STIG

HPE Aruba Networking AOS NDM Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000366, CCI-002169

Discussion

Organizations can create specific roles based on job functions and the authorizations (i.e., privileges) to perform needed operations on organizational information systems associated with the organization-defined roles. When administrators are assigned to the organizational roles, they inherit the authorizations or privileges defined for those roles. RBAC simplifies privilege administration for organizations because privileges are not assigned directly to every administrator (which can be a significant number of individuals for mid- to large-size organizations) but are instead acquired through role assignments. RBAC can be implemented either as a mandatory or discretionary form of access control. The RBAC policies and the subjects and objects are defined uniquely for each network device, so they cannot be specified in the requirement.

Check Content

Verify the AOS configuration using the web interface: 
  
1. Navigate to Configuration >> System >> Admin. Expand "Admin Authentication Options".  
2. Verify the following: 
- Default role: Is set to root. 
- Enable: Checkbox is checked. 
- The enterprise Server group is set to the configured enterprise LDAP server group.  
 
If any of the three settings above are not configured, this is a finding.

Fix Text

Configure AOS using the web interface:  
 
1. Navigate to Configuration >> System >> Admin and expand "Admin Authentication Options".  
2. Select the Default role: of root. 
3. Click the Enable: checkbox. 
4. Select the configured enterprise LDAP server group. 
5. Under Server group, click Submit >> Pending Changes >> Deploy Changes.