12.5
IG2 IG3

Centralize Network Authentication, Authorization, and Auditing (AAA)

Asset Type: Network
Security Function: Protect

Description

Centralize network AAA.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Select centralized management platform
7
Integrate all in-scope systems and data sources
8
Configure dashboards and reporting

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Inconsistent Authentication Across Network Devices

Confidentiality

Without centralized AAA, each network device maintains its own local authentication database with inconsistent password policies, no MFA capability, and credentials that persist after employee termination, enabling unauthorized access.

Terminated Employee Retaining Network Device Access

Integrity

When employees leave the organization, their access to network devices persists because local accounts on routers, switches, and firewalls are not linked to centralized identity management and must be individually removed from each device.

No Audit Trail for Network Device Administrative Actions

Integrity

Without centralized accounting, administrative actions on network devices are not consistently logged or attributed to specific users, making it impossible to determine who made configuration changes or investigate suspicious activity.

Vulnerabilities (When Safeguard Absent)

Decentralized Network Device Authentication

Network devices rely on local user accounts rather than centralized authentication (RADIUS, TACACS+, Active Directory), creating hundreds of unmanaged local credentials with no centralized password policy, rotation, or lifecycle management.

No Centralized Authorization or Accounting for Network Management

Network device access lacks centralized authorization policies defining who can execute which commands, and no centralized accounting records administrative actions, preventing role-based access control and audit trail generation.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually