Capacity
CCI-002314
Employ automated mechanisms to control remote access methods.
Choose one
17
Rule
Severity: Medium
Install firewalld Package
21
Rule
Severity: Medium
Verify firewalld Enabled
29
Rule
Severity: Medium
Verify ufw Enabled
11
Rule
Severity: Medium
Configure the Firewalld Ports
6
Rule
Severity: Medium
Firewalld Must Employ a Deny-all, Allow-by-exception Policy for Allowing Connections to Other Systems
1
Rule
Severity: Medium
Install SuSEfirewall2 Package
2
Rule
Severity: Medium
Install ufw Package
1
Rule
Severity: Medium
Compliance Guardian must control remote access methods.
6
Rule
Severity: Medium
The Apache web server must restrict inbound connections from nonsecure zones.
2
Rule
Severity: Medium
The ALG providing intermediary services for remote access communications traffic must control remote access methods.
2
Rule
Severity: Medium
The application server must control remote access methods.
1
Rule
Severity: Medium
DocAve must control remote access methods.
1
Rule
Severity: Medium
The CA API Gateway providing intermediary services for remote access communications traffic must control remote access methods.
1
Rule
Severity: High
DoD-approved encryption must be implemented to protect the confidentiality and integrity of remote access sessions, information during preparation for transmission, information during reception, and information during transmission in addition to enforcing replay-resistant authentication mechanisms for network access to privileged accounts.
2
Rule
Severity: High
Application security must be enabled on the WebSphere Liberty Server.
1
Rule
Severity: High
The WebSphere Application Server administrative security must be enabled.
1
Rule
Severity: Medium
The WebSphere Application Server users in a local user registry group must be authorized for that group.
1
Rule
Severity: Medium
Nutanix AOS must control remote access methods.
1
Rule
Severity: Medium
Nutanix AOS must disable Remote Support Sessions.
1
Rule
Severity: Medium
Remote access to OHS must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.
1
Rule
Severity: Medium
OHS must have the Order, Allow, and Deny directives set within the Directory directives set to restrict inbound connections from nonsecure zones.
1
Rule
Severity: Medium
OHS must have the Order, Allow, and Deny directives set within the Files directives set to restrict inbound connections from nonsecure zones.
1
Rule
Severity: Medium
OHS must have the Order, Allow, and Deny directives set within the Location directives set to restrict inbound connections from nonsecure zones.
9
Rule
Severity: Medium
Samsung Android must be configured to enable authentication of personal hotspot connections to the device using a pre-shared key.
2
Rule
Severity: Medium
Common Access Card (CAC)-based authentication must be enabled and enforced on the Tanium Server for all access and all accounts.
2
Rule
Severity: Medium
The VPN Gateway must be configured to perform an organization-defined action if the audit reveals unauthorized activity.
2
Rule
Severity: Medium
LockOutRealms must be used for management of Tomcat.
2
Rule
Severity: Medium
Apple iOS/iPadOS 17 must implement the management setting: Disable Allow MailDrop.
2
Rule
Severity: Medium
Apple iOS/iPadOS 16 must implement the management setting: Disable Allow MailDrop.
3
Rule
Severity: Medium
The Ubuntu operating system must have an application firewall installed in order to control remote access methods.
3
Rule
Severity: Medium
The Ubuntu operating system must enable and run the uncomplicated firewall(ufw).
2
Rule
Severity: Medium
The operating system must control remote access methods.
2
Rule
Severity: Medium
SSMC web server must restrict connections from nonsecure zones.
2
Rule
Severity: High
The HPE 3PAR OS must be configured to restrict the encryption algorithms and protocols to comply with DOD-approved encryption to protect the confidentiality and integrity of remote access sessions.
2
Rule
Severity: High
AIX must be able to control the ability of remote login for users.
4
Rule
Severity: Medium
IBM z//OS must be configured to restrict all TCP/IP ports to ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.
2
Rule
Severity: Medium
IBM z/OS must be configured to restrict all TCP/IP ports to ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.
2
Rule
Severity: Low
The ICS must be configured to generate log records containing sufficient information about where, when, identity, source, or outcome of the events.
2
Rule
Severity: Medium
The IIS 10.0 web server must restrict inbound connections from non-secure zones.
2
Rule
Severity: Medium
The Deny log on through Remote Desktop Services user right on Windows 10 workstations must at a minimum be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
2
Rule
Severity: Medium
The "Deny log on through Remote Desktop Services" user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.
2
Rule
Severity: Medium
The Deny log on through Remote Desktop Services user right on domain controllers must be configured to prevent unauthenticated access.
2
Rule
Severity: Medium
The "Deny log on through Remote Desktop Services" user right on member servers must be configured to prevent access from highly privileged domain accounts and all local accounts on domain systems and from unauthenticated access on all systems.
2
Rule
Severity: Medium
Windows Server 2019 Deny log on through Remote Desktop Services user right on domain controllers must be configured to prevent unauthenticated access.
2
Rule
Severity: Medium
Windows Server 2019 "Deny log on through Remote Desktop Services" user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and all local accounts and from unauthenticated access on all systems.
2
Rule
Severity: Medium
Windows Server 2022 Deny log on through Remote Desktop Services user right on domain controllers must be configured to prevent unauthenticated access.
2
Rule
Severity: Medium
Windows Server 2022 Deny log on through Remote Desktop Services user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and all local accounts and from unauthenticated access on all systems.
2
Rule
Severity: Medium
The Oracle Linux operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management Component Local Service Assessment (PPSM CLSA) and vulnerability assessments.
2
Rule
Severity: Medium
An OL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
2
Rule
Severity: Medium
A firewall must be installed on OL 8.
2
Rule
Severity: Medium
A firewall must be active on OL 8.
2
Rule
Severity: Medium
The Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must control remote access methods (inspect and filter traffic).
1
Rule
Severity: Medium
The Red Hat Enterprise Linux operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management Component Local Service Assessment (PPSM CLSA) and vulnerability assessments.
2
Rule
Severity: Medium
A RHEL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
2
Rule
Severity: Medium
A firewall must be installed on RHEL 8.
2
Rule
Severity: Medium
A firewall must be active on RHEL 8.
2
Rule
Severity: Medium
RHEL 9 must have the firewalld package installed.
2
Rule
Severity: Medium
The firewalld service on RHEL 9 must be active.
1
Rule
Severity: Medium
RHEL 9 must control remote access methods.
4
Rule
Severity: Medium
The SUSE operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.
1
Rule
Severity: Medium
Samsung Android must be configured to enable authentication of personal hotspot connections to the device using a preshared key.
2
Rule
Severity: Medium
Samsung Android must be configured to enable authentication of personal hotspot connections to the device using a preshared key.
- Disallow config tethering.
2
Rule
Severity: Medium
The VMM must control remote access methods.
4
Rule
Severity: Medium
The ESXi host must be configured to disable nonessential capabilities by disabling Secure Shell (SSH).
1
Rule
Severity: Medium
VAMI must use cryptography to protect the integrity of remote sessions.
1
Rule
Severity: Medium
Envoy must exclusively use the HTTPS protocol for client connections.
3
Rule
Severity: Medium
The vCenter VAMI service must use cryptography to protect the integrity of remote sessions.
2
Rule
Severity: Medium
Remote access to the web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.
2
Rule
Severity: Medium
The web server must restrict inbound connections from nonsecure zones.
1
Rule
Severity: Medium
The BIG-IP APM module access policy profile must control remote access methods to virtual servers.
1
Rule
Severity: Medium
The BIG-IP Core implementation providing intermediary services for remote access communications traffic must control remote access methods to virtual servers.
1
Rule
Severity: Medium
Ubuntu 22.04 LTS must have an application firewall installed in order to control remote access methods.
1
Rule
Severity: Medium
Ubuntu 22.04 LTS must enable and run the Uncomplicated Firewall (ufw).
2
Rule
Severity: Medium
Google Android 15 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.
1
Rule
Severity: Medium
SLEM 5 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.
1
Rule
Severity: Medium
A firewall must be installed on TOSS.
1
Rule
Severity: Medium
Apple iOS/iPadOS 18 must implement the management setting: disable Allow MailDrop.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%