The Dell OS10 Switch must enforce access restrictions associated with changes to the system components.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-269801 | OS10-NDM-000920 | SV-269801r1051788_rule | CCI-000345 | medium |
| Description | ||||
| Changes to the hardware or software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network device for implementing any changes or upgrades. This requirement applies to updates of the application files, configuration, ACLs, and policy filters. | ||||
| STIG | Date | |||
| Dell OS10 Switch NDM Security Technical Implementation Guide | 2024-12-11 | |||
Details
Check Text (C-269801r1051788_chk)
Check the OS10 Switch to determine if only authorized administrators have permissions for changes, deletions, and updates on the network device. Inspect the maintenance log to verify changes are being made only by the authorized administrators.
Changes, deletions, and updates in Dell OS10 can only be done by users with sysadmin, secadmin, or netadmin role. Verify if there are any unauthorized users assigned to the any of these roles:
OS10# show running-configuration users
If any unauthorized users are assigned to the sysadmin, secadmin, or netadmin role, this is a finding.
Fix Text (F-73735r1051787_fix)
Configure any unauthorized users to have the netoperator role that cannot make any changes:
OS10(config)# username <name> password ********** role netoperator