2. Users Management
CIS Guidelines for securing a pfSense Firewall
2.1 Ensure Sessions Timeout is set to less than or equal to 10 minutes
Description:
The session inactivity timeout setting represents the amount of time a user can be inactive before the user's session times out and closes. It only affects user browser sessions.
Rationale:
Indefinite or even long session timeout window increase the risk of attackers abusing abandoned sessions
Audit:
In the GUI:
- Navigate to System > User Manager
- Click the Setting at the top.
- Check on the 'Session Timeout' field.Default Value: Username listed will be: 'admin'
Remediation:
In the GUI:
- Navigate to System > User Manager
- CLIck the Setting at the top.
- set 10 in the 'Session Timeout' field.
- Click SaveCIS Controls:
v8
14.3 Configure Automatic Session Locking on Enterprise
Assets
Configure automatic session locking on enterprise assets after a defined period of inactivity. For general purpose operating systems, the period must not exceed 15 minutes. For mobile end-user devices, the period must not exceed 2 minutes.
v7
16.11 Lock Workstation Sessions After Inactivity
Automatically lock workstation sessions after a standard period of inactivity.
2.2 Ensure LDAP or RADIUS server configured
Description:
Configured the LDAP Servers or Radius server for central authentication.
Rationale:
Authentication, authorization and accounting (AAA) scheme provide an authoritative source for managing and monitoring access for devices.
Audit:
In the GUI:
- Navigate to System > User Manager.
- CLIck the Authentication Servers at the top.
- Check "Authentication Servers" SettingDefault Value: Local Database
Remediation:
In the GUI:
- Navigate to System > User Manager.
- CLIck the Authentication Servers at the top.
- Configure "Authentication Servers" SettingCIS Controls:
v8
5.6 Centralize Account Management
Centralize account management through a directory or identity service.
v7
16.2 Configure Centralized Point of Authentication
Configure access for all accounts through as few centralized points of authentication as possible, including network, security, and cloud systems.
2.3 Ensure Console Menu is Password Protected
Description:
Set the Console Menu to password protected.
Rationale:
An unattended computer with an open Console Menu session to the device could allow an unauthorized user access to the firewall’s management.
Audit:
- Navigate to System > Advanced > Admin Access.
- Check "Console Options" SettingDefault Value: 'Console menu' will be unchecked
Remediation:
In the GUI:
- Navigate to System > Advanced > Admin Access.
- Set "Console Options" Setting
- CLIck "Save"CIS Controls:
v8
5.2 Use Unique Passwords
Use unique passwords for all enterprise assets. Best practice implementation includes, at a minimum, an 8-character password for accounts using MFA and a 14-character password for accounts not using MFA.
v7
4.4 Use Unique Passwords
Where multi-factor authentication is not supported (such as local administrator, root, or service accounts), accounts will use passwords that are unique to that system.
2.4 Ensure all default accounts are either disabled or utilize strong passwords
Description:
Disable the known default accounts configured. Note: The default admin account must remain enabled for high availability synchronization to work. Disabling it could cause issues.
Rationale:
Default accounts are accounts with predefined usernames and passwords that are typically included with software and hardware devices. Attackers often target default accounts because they are widely known and can be used to gain unauthorized access to a system. To prevent unauthorized access, all default accounts should either be disabled or have their passwords changed.
Audit:
In the GUI:
- Navigate to System > User Manager > Users
- View the default usersDefault Value: 'admin' is the only default user
Remediation:
In the GUI:
- Navigate to System > User Manager > Users
- Remove any default users that are not used.Note: The default admin account must remain enabled for high availability synchronization to work. Disabling it could cause issues.
Additional Information:
The known default accounts are often (without limiting to) the following: 'admin', 'guest', 'user', 'root', 'administrator', 'operator', 'supervisor', and 'demo'. It is important to change the passwords of these accounts to prevent attackers from using them to gain unauthorized access to the system. The use of strong, unique passwords for all user accounts is also recommended to further enhance security.
CIS Controls:
v8
4.7 Manage Default Accounts on Enterprise Assets and
Software
Manage default accounts on enterprise assets and software, such as root, administrator, and other pre-configured vendor accounts. Example implementations can include: disabling default accounts or making them unusable.
v7
16.9 Disable Dormant Accounts
Automatically disable dormant accounts after a set period of inactivity.
Last updated