Back
🔒
Juniper Router STIG Compliance Checklist
Hard
19 items
·
1 day
testuser
Published 1 month ago
This checklist helps network administrators and IT security teams implement the Juniper Router STIG requirements across JunOS devices. It covers preparation, hardening steps, verification, and documentation to achieve and maintain STIG compliance for routers in managed environments.
Progress
0 / 19
- Download the Juniper Router STIG package (XCCDF/HTML/PDF) — Get the latest STIG (Y25M01 or current) from DISA IASE or official resource.
- Review STIG controls and map to your environment — Identify applicable controls, exceptions, and implementation scope.
- Inventory Juniper devices and record JunOS versions — Capture device model, OS version, location, and management IP.
- Run automated STIG compliance scan (XCCDF/SCAP) — Use approved scanners and save the generated report for review.
- Apply vendor-recommended patches and JunOS updates — Patch devices to versions that address known CVEs and fixes.
- Implement STIG baseline configuration on routers — Apply STIG-required settings: interfaces, services, logging, and accounts.
- Secure management access
- Enable SSH v2 and disable Telnet — Configure SSH v2 only and remove unsecured management protocols.
- Restrict management access to trusted IPs or management VRF — Limit which hosts/networks can reach device management interfaces.
- Enforce role-based admin accounts and disable default accounts — Create least-privilege roles and remove or disable shared/default logins.
- Disable unused services and protocols — Turn off services like FTP, rsh, finger, and other unused daemons.
- Configure strong authentication and password policies — Set complexity, aging, history, and account lockout policies.
- Harden SNMP: use SNMPv3, restrict access, and change community strings — Use authenticated/encrypted SNMP and limit collectors by ACL.
- Configure NTP and lock time sources — Use trusted NTP servers and restrict NTP service to authorized hosts.
- Enable and centralize logging to a secure syslog/SIEM — Forward logs to a protected collector with retention and integrity controls.
- Deploy firewall filters and ACLs for control-plane protection — Apply anti-spoofing, management ACLs, and control-plane policing.
- Perform STIG compliance re-scan and save results — Re-run automated checks to validate applied hardening.
- Document deviations and submit Risk Acceptance (DAA) requests — Record justified exceptions and obtain formal approval where needed.
- Schedule periodic audits and subscribe to DISA IASE updates — Set recurring reviews and watch for STIG or reference updates.
Your Stats
🏆
0
Completed
📅
—
Last Done
⏱️
—
Last Time
Completion Rate
Items checked per run
⚡
—
Fastest Run
🔥
0
Streak
🚫
—
Most Skipped Step
🔄
0
Resets
📝 My Notes