STIGQter STIGQter: STIG Summary: F5 BIG-IP Device Management 11.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The F5 BIG-IP must ensure SSH is disabled for root user logon to prevent remote access using the root account.

DISA Rule

SV-217424r557520_rule

Vulnerability Number

V-217424

Group Title

SRG-APP-000142-NDM-000245

Rule Version

F5BI-DM-000284

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

To ensure that the F5 BIG-IP meets the requirements within the STIG, limit the ability to modify the configuration at the command line. SSH into the command line interface and type in the following commands.

(tmos)# modify sys db systemauth.disablerootlogin value true
(tmos)# modify sys db systemauth.disablebash value true
(tmos)# save sys config

Check Contents

Verify the F5 BIG-IP shell is locked down to limit the ability to modify the configuration through the shell.
Log in to the Configuration utility as the administrative user.

Navigate to System > Platform.
Under Root Account, verify the Disable login and Disable bash check boxes are checked.

If the value of systemauth.disablerootlogin and db systemauth.disablebash is not set to “true”, then this is a finding.

Vulnerability Number

V-217424

Documentable

False

Rule Version

F5BI-DM-000284

Severity Override Guidance

Verify the F5 BIG-IP shell is locked down to limit the ability to modify the configuration through the shell.
Log in to the Configuration utility as the administrative user.

Navigate to System > Platform.
Under Root Account, verify the Disable login and Disable bash check boxes are checked.

If the value of systemauth.disablerootlogin and db systemauth.disablebash is not set to “true”, then this is a finding.

Check Content Reference

M

Target Key

4036

Comments