Ax-OS must implement privileged access authorization to all information systems and infrastructure components for selected organization-defined vulnerability scanning activities.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-276015 | AXOS-00-000075 | SV-276015r1122695_rule | CCI-001067 | medium |
| Description | ||||
| In certain situations, the nature of the vulnerability scanning may be more intrusive, or the information system component that is the subject of the scanning may contain highly sensitive information. Privileged access authorization to selected system components facilitates more thorough vulnerability scanning and also protects the sensitive nature of such scanning. The vulnerability scanning application must use privileged access authorization for the scanning account. | ||||
| STIG | Date | |||
| Axonius Federal Systems Ax-OS Security Technical Implementation Guide | 2025-11-25 | |||
Details
Check Text (C-276015r1122695_chk)
From the Axonius Toolbox (accessed via Secure Shell [SSH]) Main Actions Menu, select the following options:
Compliance Actions >> Advanced Compliance Actions >> Update Tenable Scan Account Permissions
Enter the scanning account username.
If no scanning account has been set, this is a finding.
Fix Text (F-80058r1122694_fix)
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options:
Compliance Actions >> Advanced Compliance Actions >> Add Tenable Scan Account
Enter the username.