Skip to content

AAA Services Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • AAA Services must be configured to require multifactor authentication using Common Access Card (CAC) Personal Identity Verification (PIV) credentials for authenticating non-privileged user accounts.

    To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor aut...
    Rule Medium Severity
  • AAA Services must be configured to enforce password complexity by requiring that at least one special character be used.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Use of a complex password helps to increase the time and...
    Rule Medium Severity
  • For password-based authentication, AAA Services must be configured to store passwords using an approved salted key derivation function, preferably using a keyed hash.

    Passwords must be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily comp...
    Rule High Severity
  • AAA Services must be configured to encrypt transmitted credentials using a FIPS-validated cryptographic module.

    Passwords need to be protected at all times and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily co...
    Rule High Severity
  • AAA Services must be configured to enforce 24 hours as the minimum password lifetime.

    Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. Restricting this setting limits the user's ability to...
    Rule Medium Severity
  • AAA Services must be configured to enforce a 60-day maximum password lifetime restriction.

    Any password, no matter how complex, can eventually be cracked; therefore, passwords must be changed at specific intervals. One method of minimizing this risk is to use complex passwords and peri...
    Rule Medium Severity
  • AAA Services must be configured to only accept certificates issued by a DoD-approved Certificate Authority for PKI-based authentication.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...
    Rule High Severity
  • AAA Services must be configured to not accept certificates that have been revoked for PKI-based authentication.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...
    Rule High Severity
  • AAA Services must be configured to enforce authorized access to the corresponding private key for PKI-based authentication.

    If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...
    Rule Medium Severity
  • AAA Services must be configured to protect the confidentiality and integrity of all information at rest.

    Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive) within an organizational information system. Mobile devices...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules