Capacity
CCI-002169
Enforce a role-based access control policy over defined subjects and objects based upon organization-defined roles and users authorized to assume such roles.
Choose one
1
Rule
Severity: Low
AAA Services must be configured to use Role-Based Access Control (RBAC) policy for levels of access authorization.
2
Rule
Severity: Medium
If the Arista network device uses role-based access control, the network device must enforce organization-defined role-based access control policies over defined subjects and objects.
2
Rule
Severity: Medium
If the network device uses role-based access control, Forescout must enforce organization-defined, role-based access control policies over defined subjects and objects.
1
Rule
Severity: Medium
If the HP FlexFabric Switch uses role-based access control, the HP FlexFabric Switch must enforce organization-defined role-based access control policies over defined subjects and objects.
1
Rule
Severity: Medium
If the HYCU Server or Web UI uses discretionary access control, the network device must enforce organization-defined discretionary access control policies over defined subjects and objects.
1
Rule
Severity: Medium
If the DataPower Gateway uses role-based access control, the DataPower Gateway must enforce role-based access control policies over defined subjects and objects.
2
Rule
Severity: Medium
If the network device uses role-based access control, the network device must enforce organization-defined role-based access control policies over defined subjects and objects.
2
Rule
Severity: High
The Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.
1
Rule
Severity: Medium
Symantec ProxySG must use Role-Based Access Control (RBAC) to assign privileges to users for access to files and functions.
2
Rule
Severity: High
The TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.
1
Rule
Severity: Medium
The UEM server must be configured to have at least one user in defined administrator roles.
2
Rule
Severity: High
The ICS must be configured to prevent nonprivileged users from executing privileged functions.
2
Rule
Severity: Medium
The Juniper EX switch must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.
1
Rule
Severity: Medium
The BIG-IP appliance must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.
1
Rule
Severity: High
The F5 BIG-IP appliance must be configured to assign appropriate user roles or access levels to authenticated users.
1
Rule
Severity: High
The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%