AAA Services Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000169
Group -
SRG-APP-000170
Group -
AAA Services must be configured to require the change of at least eight of the total number of characters when passwords are changed.
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Use of a complex password helps to increase the time and...Rule Medium Severity -
SRG-APP-000171
Group -
SRG-APP-000172
Group -
SRG-APP-000173
Group -
SRG-APP-000174
Group -
SRG-APP-000175
Group -
SRG-APP-000175
Group -
SRG-APP-000176
Group -
SRG-APP-000177
Group -
AAA Services must be configured to map the authenticated identity to the user account for PKI-based authentication.
Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis.Rule Medium Severity -
SRG-APP-000231
Group -
SRG-APP-000234
Group -
AAA Services must be configured to prevent automatically removing emergency accounts.
Emergency accounts are administrator accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation ...Rule Medium Severity -
SRG-APP-000234
Group -
SRG-APP-000291
Group -
AAA Services must be configured to notify the system administrators (SAs) and information system security officer (ISSO) when accounts are created.
Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply ...Rule Medium Severity -
SRG-APP-000292
Group -
SRG-APP-000293
Group -
AAA Services must be configured to notify the system administrators (SAs) and information system security officer (ISSO) for account disabling actions.
When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes themselves. Sending notif...Rule Medium Severity -
SRG-APP-000294
Group -
SRG-APP-000319
Group -
SRG-APP-000320
Group -
SRG-APP-000345
Group -
AAA Services must be configured to maintain locks on user accounts until released by an administrator.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the a...Rule Medium Severity -
SRG-APP-000358
Group -
AAA Services must be configured to send audit records to a centralized audit server.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.Rule Medium Severity -
SRG-APP-000374
Group -
AAA Services must be configured to use or map to Coordinated Universal Time (UTC) to record time stamps for audit records.
If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Tim...Rule Medium Severity -
SRG-APP-000375
Group -
AAA Services must be configured with a minimum granularity of one second to record time stamps for audit records.
Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records. Time stamps generated by the application include date and time. Granu...Rule Medium Severity -
SRG-APP-000394
Group -
SRG-APP-000516
Group -
AAA Services must be configured to use at least two NTP servers to synchronize time.
Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when condu...Rule Low Severity -
SRG-APP-000516
Group -
AAA Services must be configured to authenticate all NTP messages received from NTP servers and peers.
Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when condu...Rule Medium Severity -
SRG-APP-000516
Group -
AAA Services must be configured to use their loopback or OOB management interface address as the source address when originating NTP traffic.
Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when condu...Rule Low Severity -
SRG-APP-000516
Group -
SRG-APP-000516
Group -
AAA Services must not be configured with shared accounts.
Shared accounts configured for use on a network device do not allow for accountability or repudiation of individuals using them. If shared accounts are not changed when someone leaves the group, th...Rule Medium Severity -
SRG-APP-000516
Group -
AAA Services used to authenticate privileged users for device management must be configured to connect to the management network.
Using standardized authentication protocols such as RADIUS, TACACS+, and Kerberos, an authentication server provides centralized and robust authentication services for the management of network com...Rule Medium Severity -
SRG-APP-000516
Group -
AAA Services must be configured to use a unique shared secret for communication (i.e. RADIUS, TACACS+) with clients requesting authentication services.
Using standardized authentication protocols such as RADIUS, TACACS+, and Kerberos, an authentication server provides centralized and robust authentication services for the management of network com...Rule Medium Severity -
SRG-APP-000516
Group -
AAA Services must be configured to use IP segments separate from production VLAN IP segments.
When policy assessment and remediation have been implemented and the advanced AAA server dynamic VLAN is misconfigured, logical separation of the production VLAN may not be assured. Non-trusted re...Rule Medium Severity -
SRG-APP-000516
Group -
SRG-APP-000516
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.