CCI-000778
Uniquely identify organization-defined devices and/or types of devices before establishing a local, remote, and/or network connection.
The Arista Multilayer Switch must uniquely identify all network-connected endpoint devices before establishing any connection.
1 rule found Severity: Medium

When using non-Grid DNS servers for zone transfers, each name server must use TSIG to uniquely identify the other server.
1 rule found Severity: Medium

The MQ Appliance messaging server must uniquely identify all network-connected endpoint devices before establishing any connection.
1 rule found Severity: Medium

The WebSphere Application Server Single Sign On (SSO) must have SSL enabled for Web and SIP Security.
1 rule found Severity: High

Infoblox systems which are configured to perform zone transfers to non-Grid name servers must utilize transaction signatures (TSIG).
1 rule found Severity: Medium

The Windows 2012 DNS Server must uniquely identify the other DNS server before responding to a server-to-server transaction.
1 rule found Severity: Medium

The Tanium endpoint must have the Tanium Servers public key in its installation, which will allow it to authenticate and uniquely identify all network-connected endpoint devices before establishing any connection.
1 rule found Severity: Medium

3 rules found Severity: Medium

1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must disable the file system automounter unless required.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must disable the graphical user interface automounter unless required.
1 rule found Severity: Medium

The BIND 9.x server implementation must uniquely identify and authenticate the other DNS server before responding to a server-to-server transaction, zone transfer and/or dynamic update request using cryptographically based bidirectional authentication to protect the integrity of the information in transit.
1 rule found Severity: High

The BIND 9.x server implementation must utilize separate TSIG key-pairs when securing server-to-server transactions.
1 rule found Severity: Medium

The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection.
1 rule found Severity: Medium

The Cisco switch must uniquely identify and authenticate all network-connected endpoint devices before establishing any connection.
2 rules found Severity: High

The Cisco ISE must deny network connection for endpoints that cannot be authenticated using an approved method. This is required for compliance with C2C Step 4.
1 rule found Severity: Medium

The DNS server implementation must uniquely identify the other DNS server before responding to a server-to-server transaction.
1 rule found Severity: Medium

The F5 BIG-IP must be configured to identify and authenticate all endpoint devices or peers before establishing a connection.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Enterprise Voice, Video, and Messaging Session Manager must be configured to uniquely identify each Voice Video Endpoint device before registration.
1 rule found Severity: Medium

The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection.
1 rule found Severity: High

1 rule found Severity: Medium

The layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection.
1 rule found Severity: High

The Windows DNS Server must uniquely identify the other DNS server before responding to a server-to-server transaction.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Oracle Linux operating system must disable the graphical user interface automounter unless required.
1 rule found Severity: Medium

1 rule found Severity: Medium

AAA Services used for 802.1x must be configured to uniquely identify network endpoints (supplicants) before the authenticator establishes any connection.
1 rule found Severity: Medium

The application must utilize mutual authentication when endpoint device non-repudiation protections are required by DoD policy or by the data owner.
1 rule found Severity: Medium

The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection.
1 rule found Severity: High

The container platform must uniquely identify all network-connected nodes before establishing any connection.
1 rule found Severity: Medium

1 rule found Severity: Medium

AlmaLinux OS 9 must prevent a user from overriding the disabling of the graphical user interface automount function.
1 rule found Severity: Medium

AlmaLinux OS 9 must prevent a user from overriding the disabling of the graphical user interface autorun function.
1 rule found Severity: Medium

The Dell OS10 Switch must uniquely identify all network-connected endpoint devices before establishing any connection.
1 rule found Severity: High

Forescout must deny network connection for endpoints that cannot be authenticated using an approved method. This is required for compliance with C2C Step 4.
1 rule found Severity: Medium

1 rule found Severity: Medium

AOS, when used as a VPN Gateway, must uniquely identify all network-connected endpoint devices before establishing a connection.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 9 must prevent a user from overriding the disabling of the graphical user interface automount function.
1 rule found Severity: Medium

RHEL 9 must prevent a user from overriding the disabling of the graphical user interface autorun function.
1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The VPN Gateway must uniquely identify all network-connected endpoint devices before establishing a connection.
1 rule found Severity: Medium

The SEL-2740S must uniquely identify all network-connected endpoint devices before establishing any connection.
1 rule found Severity: High
