STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to AAA Services Security Requirements Guide

V-204687

CAT II (Medium)

AAA Services must be configured to notify system administrators (SAs) and information system security officer (ISSO) of account enabling actions.

Rule ID

SV-204687r981586_rule

STIG

AAA Services Security Requirements Guide

Version

V2R2

CCIs

CCI-000015

Discussion

Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply enable a new or disabled account. Sending notification of account enabling events to the system administrator and ISSO is one method for mitigating this risk. Such a capability greatly reduces the risk that application accessibility will be negatively affected for extended periods of time and provides logging that can be used for forensic purposes. In order to detect and respond to events that affect user accessibility and application processing, the AAA or directory services must notify the appropriate individuals so they can investigate the event. AAA Services may not have built-in capabilities to notify the administrators and ISSO and may require the use of third-party tools (e.g. SNMP, SIEM) to perform the notification.

Check Content

If AAA Services rely on directory services for user account management, this is not applicable and the connected directory services must perform this function. 

Verify AAA Services are configured to notify the SAs and the ISSO of account enabling actions.

If AAA Services are not configured to notify the SAs and the ISSO of account enabling actions, this is a finding.

Fix Text

Configure AAA Services to notify the SAs and the ISSO of account enabling actions.