Cisco NX OS Switch NDM Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000001-NDM-000200
Group -
The Cisco switch must be configured to limit the number of concurrent management sessions to an organization-defined number.
Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administr...Rule Medium Severity -
SRG-APP-000026-NDM-000208
Group -
SRG-APP-000027-NDM-000209
Group -
The Cisco switch must be configured to automatically audit account modification.
Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security of the network device. Account management by a designated authority ens...Rule Medium Severity -
SRG-APP-000028-NDM-000210
Group -
The Cisco switch must be configured to automatically audit account disabling actions.
Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account disabling actions will ...Rule Medium Severity -
SRG-APP-000029-NDM-000211
Group -
The Cisco switch must be configured to automatically audit account removal actions.
Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will su...Rule Medium Severity -
SRG-APP-000038-NDM-000213
Group -
SRG-APP-000065-NDM-000214
Group -
The Cisco switch must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must disconnect the session.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.Rule Medium Severity -
SRG-APP-000068-NDM-000215
Group -
The Cisco switch must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executi...Rule Medium Severity -
SRG-APP-000080-NDM-000220
Group -
SRG-APP-000097-NDM-000227
Group -
The Cisco switch must produce audit records containing information to establish where the events occurred.
In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as device hardware components, device softw...Rule Medium Severity -
SRG-APP-000101-NDM-000231
Group -
The Cisco switch must be configured to generate audit records containing the full-text recording of privileged commands.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Organizations consider limiting the additional audit information to only ...Rule Medium Severity -
SRG-APP-000142-NDM-000245
Group -
SRG-APP-000148-NDM-000346
Group -
SRG-APP-000156-NDM-000250
Group -
The Cisco switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.
A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...Rule Medium Severity -
SRG-APP-000166-NDM-000254
Group -
SRG-APP-000167-NDM-000255
Group -
SRG-APP-000168-NDM-000256
Group -
The Cisco switch must be configured to enforce password complexity by requiring that at least one numeric character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-APP-000169-NDM-000257
Group -
SRG-APP-000190-NDM-000267
Group -
SRG-APP-000319-NDM-000283
Group -
The Cisco switch must be configured to automatically audit account enabling actions.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply...Rule Medium Severity -
SRG-APP-000343-NDM-000289
Group -
The Cisco switch must be configured to audit the execution of privileged functions.
Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...Rule Medium Severity -
SRG-APP-000357-NDM-000293
Group -
SRG-APP-000360-NDM-000295
Group -
The Cisco switch must be configured to generate an alert for all audit failure events.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impe...Rule Medium Severity -
SRG-APP-000373-NDM-000298
Group -
SRG-APP-000374-NDM-000299
Group -
The Cisco switch must be configured to record time stamps for log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Tim...Rule Medium Severity -
SRG-APP-000395-NDM-000310
Group -
SRG-APP-000395-NDM-000310
Group -
The Cisco switch must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.
Without the strong encryption that is provided by the SNMP Version 3 User-based Security Model (USM), an unauthorized user can gain access to network management information that can be used to crea...Rule Medium Severity -
SRG-APP-000395-NDM-000347
Group -
The Cisco switch must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.
If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will mak...Rule Medium Severity -
SRG-APP-000411-NDM-000330
Group -
SRG-APP-000412-NDM-000331
Group -
The Cisco switch must be configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions.
This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryp...Rule High Severity -
SRG-APP-000495-NDM-000318
Group -
SRG-APP-000499-NDM-000319
Group -
The Cisco switch must be configured to generate log records when administrator privileges are deleted.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.