STIGQter STIGQter: STIG Summary: Palo Alto Networks NDM Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 24 Jan 2020:

The Palo Alto Networks security platform must prohibit the use of unencrypted protocols for network access to privileged accounts.

DISA Rule

SV-77227r1_rule

Vulnerability Number

V-62737

Group Title

SRG-APP-000172-NDM-000259

Rule Version

PANW-NM-000061

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Go to Device >> Setup >> Management
In the "Management Interface Settings" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane). In the "Management Interface Settings" window, make sure that HTTP and Telnet are not checked (enabled).
If they are not checked, select either "OK" or "Cancel".
If either one is checked, select the check box to disable it, then select "OK".
If any changes were made, commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.

Check Contents

Go to Device >> Setup >> Management
View the "Management Interface Settings" pane.
If either Telnet or HTTP is listed in the "Services" field, this is a finding.

Vulnerability Number

V-62737

Documentable

False

Rule Version

PANW-NM-000061

Severity Override Guidance

Go to Device >> Setup >> Management
View the "Management Interface Settings" pane.
If either Telnet or HTTP is listed in the "Services" field, this is a finding.

Check Content Reference

M

Responsibility

Designated Approving Authority

Target Key

2811

Comments