AAA Services Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
AAA Services must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Configuring the application to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baselin...Rule Medium Severity -
SRG-APP-000700
Group -
AAA Services must be configured to disable accounts when the accounts have expired.
Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality, which reduce the attack surface of the system.Rule Medium Severity -
SRG-APP-000705
Group -
SRG-APP-000710
Group -
AAA Services must be configured to disable accounts when the accounts are in violation of organizational policy.
Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality, which reduce the attack surface of the system.Rule Medium Severity -
SRG-APP-000805
Group -
AAA Services must be configured to automatically generate audit records of the enforcement actions.
Organizations log system accesses associated with applying configuration changes to ensure that configuration change control is implemented and to support after-the-fact actions should organization...Rule Medium Severity -
SRG-APP-000815
Group -
AAA Services must be configured to require users to be individually authenticated before granting access to the shared accounts or resources.
Individual authentication prior to shared group authentication mitigates the risk of using group accounts or authenticators.Rule Medium Severity -
SRG-APP-000835
Group -
SRG-APP-000840
Group -
For password-based authentication, AAA Services must be configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
Password-based authentication applies to passwords regardless of whether they are used in single-factor or multi-factor authentication. Long passwords or passphrases are preferable over shorter pas...Rule Medium Severity -
SRG-APP-000845
Group -
SRG-APP-000855
Group -
SRG-APP-000860
Group -
For password-based authentication, AAA Services must be configured to allow user selection of long passwords and passphrases, including spaces and all printable characters.
Password-based authentication applies to passwords regardless of whether they are used in single-factor or multi-factor authentication. Long passwords or passphrases are preferable over shorter pas...Rule Medium Severity -
SRG-APP-000865
Group -
SRG-APP-000875
Group -
SRG-APP-000910
Group -
AAA Services must be configured to include only approved trust anchors in trust stores or certificate stores managed by the organization.
Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certificates related to the internal operations of systems, such as application-...Rule Medium Severity -
AAA Services must be configured to provide automated account management functions.
Enterprise environments make account management challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other error. A comprehensive acc...Rule Medium Severity -
AAA Services must be configured to automatically disable accounts after a 35-day period of account inactivity.
Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. Owners of inactive accounts will not notice if unauthorized access to...Rule Medium Severity -
AAA Services must be configured to automatically audit account modification.
Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply modify ...Rule Medium Severity -
AAA Services configuration audit records must identify what type of events occurred.
Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. Audit r...Rule Medium Severity -
AAA Services configuration audit records must identify any individual user or process associated with the event.
Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility...Rule Medium Severity -
AAA Services must be configured to alert the SA and ISSO when any audit processing failure occurs.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...Rule Medium Severity -
AAA Services must be configured to disable non-essential modules.
It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and...Rule Medium Severity -
AAA Services must be configured to use protocols that encrypt credentials when authenticating clients, as defined in the PPSM CAL and vulnerability assessments.
Authentication protection of the client credentials (specifically the password or shared secret) prevents unauthorized access to resources. The RADIUS protocol encrypts the password field in the ac...Rule High Severity -
AAA Services must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable...Rule Medium Severity -
AAA Services must be configured to require multifactor authentication using Common Access Card (CAC) Personal Identity Verification (PIV) credentials for authenticating non-privileged user accounts.
To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor aut...Rule Medium Severity -
AAA Services must be configured to enforce password complexity by requiring that at least one special character be used.
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Use of a complex password helps to increase the time and...Rule Medium Severity -
For password-based authentication, AAA Services must be configured to store passwords using an approved salted key derivation function, preferably using a keyed hash.
Passwords must be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily comp...Rule High Severity -
AAA Services must be configured to encrypt transmitted credentials using a FIPS-validated cryptographic module.
Passwords need to be protected at all times and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily co...Rule High Severity -
AAA Services must be configured to enforce 24 hours as the minimum password lifetime.
Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. Restricting this setting limits the user's ability to...Rule Medium Severity -
AAA Services must be configured to enforce a 60-day maximum password lifetime restriction.
Any password, no matter how complex, can eventually be cracked; therefore, passwords must be changed at specific intervals. One method of minimizing this risk is to use complex passwords and peri...Rule Medium Severity -
AAA Services must be configured to only accept certificates issued by a DoD-approved Certificate Authority for PKI-based authentication.
Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...Rule High Severity -
AAA Services must be configured to not accept certificates that have been revoked for PKI-based authentication.
Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...Rule High Severity -
AAA Services must be configured to enforce authorized access to the corresponding private key for PKI-based authentication.
If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...Rule Medium Severity -
AAA Services must be configured to protect the confidentiality and integrity of all information at rest.
Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive) within an organizational information system. Mobile devices...Rule High Severity -
AAA Services must be configured to prevent automatically disabling emergency accounts.
Emergency accounts are administrator accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation ...Rule Low Severity -
AAA Services must be configured to notify the system administrators (SAs) and information system security officer (ISSO) when accounts are modified.
When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes themselves. Sending notif...Rule Medium Severity -
AAA Services must be configured to notify the system administrators (SAs) and information system security officer (ISSO) for account removal actions.
When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for identifying the application processes themselves. Sending notification of a...Rule Medium Severity -
AAA Services must be configured to automatically audit account enabling actions.
Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply e...Rule Medium Severity -
AAA Services must be configured to notify system administrators (SAs) and information system security officer (ISSO) of account enabling actions.
Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply e...Rule Medium Severity -
AAA Services used for 802.1x must be configured to authenticate network endpoint devices (supplicants) before the authenticator establishes any connection.
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. For distributed architectures (e.g., service-oriented architectures), th...Rule Medium Severity -
AAA Services used for 802.1x must be configured to use secure Extensible Authentication Protocol (EAP), such as EAP-TLS, EAP-TTLS, and PEAP.
Additional new EAP methods/types are still being proposed. However, the three being considered secure are EAP-TLS, EAP-TTLS, and PEAP. PEAP is the preferred EAP type to be used in DoD for its abili...Rule Medium Severity -
AAA Services must be configured to place non-authenticated network access requests in the Unauthorized VLAN or the Guest VLAN with limited access.
Devices having an IP address that do not pass authentication can be used to attack compliant devices if they share VLANs. When devices proceed into the NAC AAA (radius) functions they must originat...Rule Medium Severity -
AAA Services must be configured to disable accounts when the accounts are no longer associated to a user.
Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality, which reduce the attack surface of the system.Rule Medium Severity -
For password-based authentication, AAA Services must be configured to update the list of passwords on an organization-defined frequency.
Password-based authentication applies to passwords regardless of whether they are used in single-factor or multi-factor authentication. Long passwords or passphrases are preferable over shorter pas...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.