STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated just now
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to ForeScout CounterACT NDM Security Technical Implementation Guide

V-255654

CAT I (High)

CounterACT appliances performing maintenance functions must restrict use of these functions to authorized personal only.

Rule ID

SV-255654r961545_rule

STIG

ForeScout CounterACT NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366CCI-002883

Discussion

There are security-related issues arising from software brought into the network device specifically for diagnostic and repair actions (e.g., a software packet sniffer installed on a device to troubleshoot system traffic or a vendor installing or running a diagnostic application to troubleshoot an issue with a vendor-supported device). If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the system. This requirement addresses security-related issues associated with maintenance tools used specifically for diagnostic and repair actions on organizational network devices. Maintenance tools can include hardware, software, and firmware items. Maintenance tools are potential vehicles for transporting malicious code, either intentionally or unintentionally, into a facility and subsequently into organizational information systems. Maintenance tools can include, for example, hardware/software diagnostic test equipment and hardware/software packet sniffers. This requirement does not cover hardware/software components that may support information system maintenance yet are a part of the system (e.g., the software implementing "ping," "ls," "ipconfig," or the hardware and software implementing the monitoring port of an Ethernet switch).

Check Content

Determine if the network device restricts the use of maintenance functions to authorized personnel only. View the list of users defined on the device.

 Select Tools >> Options >> Console User Profiles.

If other personnel can use maintenance functions on the network device, this is a finding.

Fix Text

Configure the access privileges to CounterACT to restrict use of maintenance functions to authorized personnel only.

1. Select Tools >> Options >> Console User Profiles.
2. Adjust or remove the unauthorized group or user profile.

Note: The RAFACS must also be inspected for unauthorized users.