Skip to content

Dell OS10 Switch NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000167-NDM-000255

    Group
  • SRG-APP-000168-NDM-000256

    Group
  • SRG-APP-000169-NDM-000257

    Group
  • The Dell OS10 Switch must enforce password complexity by requiring that at least one special character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000175-NDM-000262

    Group
  • The Dell OS10 Switch must be configured to use DOD-approved OCSP responders or CRLs to validate certificates used for PKI-based authentication.

    Once issued by a DOD certificate authority (CA), public key infrastructure (PKI) certificates are typically valid for three years or shorter within the DOD. However, there are many reasons a certif...
    Rule High Severity
  • SRG-APP-000177-NDM-000263

    Group
  • SRG-APP-000179-NDM-000265

    Group
  • SRG-APP-000190-NDM-000267

    Group
  • SRG-APP-000340-NDM-000288

    Group
  • SRG-APP-000360-NDM-000295

    Group
  • SRG-APP-000395-NDM-000310

    Group
  • SRG-APP-000395-NDM-000347

    Group
  • SRG-APP-000400-NDM-000313

    Group
  • The Dell OS10 Switch must prohibit the use of cached authenticators after an organization-defined time period.

    Some authentication implementations can be configured to use cached authenticators. If cached authentication information is out-of-date, the validity of the authentication information may be quest...
    Rule Medium Severity
  • SRG-APP-000411-NDM-000330

    Group
  • SRG-APP-000412-NDM-000331

    Group
  • The Dell OS10 Switch must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.

    This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryp...
    Rule High Severity
  • SRG-APP-000435-NDM-000315

    Group
  • SRG-APP-000457-NDM-000352

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules