Cisco IOS XE Router NDM Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000001-NDM-000200
Group -
SRG-APP-000026-NDM-000208
Group -
The Cisco router must be configured to automatically audit account creation.
Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. Notifica...Rule Medium Severity -
SRG-APP-000027-NDM-000209
Group -
SRG-APP-000028-NDM-000210
Group -
The Cisco router must be configured to automatically audit account disabling actions.
Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account disabling actions will ...Rule Medium Severity -
SRG-APP-000029-NDM-000211
Group -
The Cisco router must be configured to automatically audit account removal actions.
Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will su...Rule Medium Severity -
SRG-APP-000038-NDM-000213
Group -
SRG-APP-000065-NDM-000214
Group -
SRG-APP-000068-NDM-000215
Group -
The Cisco router must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executi...Rule Medium Severity -
SRG-APP-000080-NDM-000220
Group -
SRG-APP-000096-NDM-000226
Group -
SRG-APP-000097-NDM-000227
Group -
SRG-APP-000101-NDM-000231
Group -
SRG-APP-000119-NDM-000236
Group -
SRG-APP-000120-NDM-000237
Group -
SRG-APP-000133-NDM-000244
Group -
SRG-APP-000142-NDM-000245
Group -
SRG-APP-000148-NDM-000346
Group -
SRG-APP-000164-NDM-000252
Group -
The Cisco router must be configured to enforce a minimum 15-character password length.
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to d...Rule Medium Severity -
SRG-APP-000166-NDM-000254
Group -
SRG-APP-000167-NDM-000255
Group -
The Cisco router must be configured to enforce password complexity by requiring that at least one lowercase character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-APP-000168-NDM-000256
Group -
SRG-APP-000169-NDM-000257
Group -
The Cisco router must be configured to enforce password complexity by requiring that at least one special character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-APP-000170-NDM-000329
Group -
The Cisco router must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at ...Rule Medium Severity -
SRG-APP-000171-NDM-000258
Group -
The Cisco router must only store cryptographic representations of passwords.
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...Rule High Severity -
SRG-APP-000190-NDM-000267
Group -
SRG-APP-000319-NDM-000283
Group -
The Cisco router must be configured to automatically audit account enabling actions.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply...Rule Medium Severity -
SRG-APP-000357-NDM-000293
Group -
The Cisco router must be configured to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
In order to ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able to allocate audit record storage capacity. The task of allocating audit ...Rule Medium Severity -
SRG-APP-000360-NDM-000295
Group -
The Cisco router must be configured to generate an alert for all audit failure events.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impe...Rule Medium Severity -
SRG-APP-000373-NDM-000298
Group -
SRG-APP-000395-NDM-000310
Group -
The Cisco router must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...Rule Medium Severity -
SRG-APP-000395-NDM-000310
Group -
SRG-APP-000395-NDM-000347
Group -
SRG-APP-000411-NDM-000330
Group -
SRG-APP-000412-NDM-000331
Group -
SRG-APP-000499-NDM-000319
Group -
SRG-APP-000503-NDM-000320
Group -
The Cisco router must be configured to generate audit records when successful/unsuccessful logon attempts occur.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.