Capacity
CCI-000778
Uniquely identify organization-defined devices and/or types of devices before establishing a local, remote, and/or network connection.
Choose one
11
Rule
Severity: Medium
Disable GNOME3 Automounting
12
Rule
Severity: Medium
Disable GNOME3 Automount Opening
12
Rule
Severity: Low
Disable GNOME3 Automount running
23
Rule
Severity: Medium
Disable the Automounter
19
Rule
Severity: Medium
Disable Modprobe Loading of USB Storage Driver
5
Rule
Severity: Medium
Configure Certificate Directives for LDAP Use of TLS
2
Rule
Severity: Medium
AAA Services used for 802.1x must be configured to uniquely identify network endpoints (supplicants) before the authenticator establishes any connection.
1
Rule
Severity: Medium
The Arista Multilayer Switch must uniquely identify all network-connected endpoint devices before establishing any connection.
2
Rule
Severity: Medium
The application must utilize mutual authentication when endpoint device non-repudiation protections are required by DoD policy or by the data owner.
2
Rule
Severity: High
The BIND 9.x server implementation must uniquely identify and authenticate the other DNS server before responding to a server-to-server transaction, zone transfer and/or dynamic update request using cryptographically based bidirectional authentication to protect the integrity of the information in transit.
2
Rule
Severity: Medium
The BIND 9.x server implementation must utilize separate TSIG key-pairs when securing server-to-server transactions.
2
Rule
Severity: Medium
The DNS server implementation must uniquely identify the other DNS server before responding to a server-to-server transaction.
2
Rule
Severity: Medium
Forescout must deny network connection for endpoints that cannot be authenticated using an approved method. This is required for compliance with C2C Step 4.
1
Rule
Severity: Medium
When using non-Grid DNS servers for zone transfers, each name server must use TSIG to uniquely identify the other server.
1
Rule
Severity: Medium
The MQ Appliance messaging server must uniquely identify all network-connected endpoint devices before establishing any connection.
1
Rule
Severity: High
The WebSphere Application Server Single Sign On (SSO) must have SSL enabled for Web and SIP Security.
1
Rule
Severity: Medium
Infoblox systems which are configured to perform zone transfers to non-Grid name servers must utilize transaction signatures (TSIG).
2
Rule
Severity: Medium
The JBoss server must be configured to bind the management interfaces to only management networks.
2
Rule
Severity: High
The layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection.
1
Rule
Severity: Medium
The Windows 2012 DNS Server must uniquely identify the other DNS server before responding to a server-to-server transaction.
1
Rule
Severity: Medium
Nutanix AOS must be configured to disable USB mass storage devices.
1
Rule
Severity: Medium
The Tanium endpoint must have the Tanium Servers public key in its installation, which will allow it to authenticate and uniquely identify all network-connected endpoint devices before establishing any connection.
2
Rule
Severity: Medium
The Tanium endpoint must have the Tanium Server's pki.db in its installation.
3
Rule
Severity: Medium
The Tanium endpoint must have the Tanium Servers public key in its installation.
2
Rule
Severity: Medium
The VPN Gateway must uniquely identify all network-connected endpoint devices before establishing a connection.
2
Rule
Severity: Medium
The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection.
4
Rule
Severity: High
The Cisco switch must uniquely identify and authenticate all network-connected endpoint devices before establishing any connection.
2
Rule
Severity: Medium
The Cisco ISE must deny network connection for endpoints that cannot be authenticated using an approved method. This is required for compliance with C2C Step 4.
2
Rule
Severity: High
The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection.
2
Rule
Severity: Medium
The container platform must uniquely identify all network-connected nodes before establishing any connection.
2
Rule
Severity: Medium
The operating system must uniquely identify peripherals before establishing a connection.
2
Rule
Severity: Medium
AIX must configure the ttys value for all interactive users.
2
Rule
Severity: High
The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection.
2
Rule
Severity: Medium
The Oracle Linux operating system must be configured to disable USB mass storage.
2
Rule
Severity: Medium
The Oracle Linux operating system must disable the file system automounter unless required.
2
Rule
Severity: Medium
The Oracle Linux operating system must disable the graphical user interface automounter unless required.
2
Rule
Severity: Medium
The OL 8 file system automounter must be disabled unless required.
2
Rule
Severity: Medium
OL 8 must be configured to disable the ability to use USB mass storage devices.
1
Rule
Severity: Medium
The Red Hat Enterprise Linux operating system must be configured to disable USB mass storage.
1
Rule
Severity: Medium
The Red Hat Enterprise Linux operating system must disable the file system automounter unless required.
2
Rule
Severity: Medium
The RHEL 8 file system automounter must be disabled unless required.
2
Rule
Severity: Medium
RHEL 8 must be configured to disable USB mass storage.
1
Rule
Severity: Medium
The Red Hat Enterprise Linux operating system must disable the graphical user interface automounter unless required.
2
Rule
Severity: Medium
RHEL 9 file system automount function must be disabled unless required.
4
Rule
Severity: Medium
The SUSE operating system must disable the file system automounter unless required.
2
Rule
Severity: Medium
RHEL 9 must disable the graphical user interface automount function unless required.
2
Rule
Severity: Medium
RHEL 9 must prevent a user from overriding the disabling of the graphical user interface automount function.
2
Rule
Severity: Medium
RHEL 9 must prevent a user from overriding the disabling of the graphical user interface autorun function.
2
Rule
Severity: Medium
RHEL 9 must be configured to disable USB mass storage.
2
Rule
Severity: Medium
The VMM must uniquely identify peripherals before establishing a connection.
1
Rule
Severity: Medium
The Photon operating system must disable the loading of unnecessary kernel modules.
3
Rule
Severity: Medium
The Photon operating system must disable unnecessary kernel modules.
2
Rule
Severity: Medium
The Windows DNS Server must uniquely identify the other DNS server before responding to a server-to-server transaction.
1
Rule
Severity: Medium
The F5 BIG-IP must be configured to identify and authenticate all endpoint devices or peers before establishing a connection.
1
Rule
Severity: Medium
An authoritative name server must be configured to enable DNSSEC Resource Records.
1
Rule
Severity: Medium
The Enterprise Voice, Video, and Messaging Session Manager must be configured to uniquely identify each Voice Video Endpoint device before registration.
1
Rule
Severity: Medium
IPSec network encryption must be configured.
1
Rule
Severity: Medium
SLEM 5 must disable the file system automounter unless required.
1
Rule
Severity: Medium
The TOSS file system automounter must be disabled unless required.
1
Rule
Severity: Medium
TOSS must be configured to disable USB mass storage.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%