AOS must prohibit the use of cached authenticators after an organization-defined time period.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-266959ARBA-ND-000313SV-266959r1039898_ruleCCI-002007medium
Description
Some authentication implementations can be configured to use cached authenticators. If cached authentication information is out of date, the validity of the authentication information may be questionable. The organization-defined time period should be established for each device depending on the nature of the device; for example, a device with just a few administrators in a facility with spotty network connectivity may merit a longer caching time period than a device with many administrators.
STIGDate
HPE Aruba Networking AOS NDM Security Technical Implementation Guide2024-10-29

Details

Check Text (C-266959r1039898_chk)

Verify the AOS configuration with the following command: show configuration effective | include auth-survivability If "aaa auth-survivability enable" is returned and "auth-survivability" is enabled, this is a finding.

Fix Text (F-70786r1039897_fix)

Configure AOS with the following commands: configure terminal no aaa auth-survivability enable write memory