Skip to content

Forescout Network Device Management Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000395-NDM-000347

    Group
  • Before establishing a connection with a Network Time Protocol (NTP) server, Forescout must authenticate using a bidirectional, cryptographically based authentication method that uses a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the NTP server.

    If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will mak...
    Rule Medium Severity
  • SRG-APP-000166-NDM-000254

    Group
  • Forescout must enforce password complexity by requiring that at least one uppercase character be used.

    Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisti...
    Rule Medium Severity
  • SRG-APP-000167-NDM-000255

    Group
  • Forescout must enforce password complexity by requiring that at least one lowercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000164-NDM-000252

    Group
  • Forescout must enforce a minimum 15-character password length.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to d...
    Rule Medium Severity
  • SRG-APP-000168-NDM-000256

    Group
  • Forescout must enforce password complexity by requiring that at least one numeric character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000169-NDM-000257

    Group
  • Forescout must enforce password complexity by requiring that at least one special character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000170-NDM-000329

    Group
  • SRG-APP-000179-NDM-000265

    Group
  • Forescout must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.

    Unapproved mechanisms used for authentication to the cryptographic module are not validated and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromi...
    Rule High Severity
  • SRG-APP-000190-NDM-000267

    Group
  • SRG-APP-000231-NDM-000271

    Group
  • SRG-APP-000516-NDM-000350

    Group
  • Forescout must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the Information System Security Officer (ISSO).

    The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate security personnel. The stored log data can be used to detect weaknesses in...
    Rule High Severity
  • Forescout must be configured with only one web account and one CLI account of last resort with limited access and used only when the authentication server is unavailable.

    Authentication for administrative (privileged-level) access to the device is required at all times. An account can be created on the device's local database for use when the authentication server i...
    Rule Medium Severity
  • Forescout must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.

    Display of the DoD-approved use notification before granting access to the application ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive ...
    Rule Low Severity
  • Forescout must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.

    The banner must be acknowledged by the administrator prior to the device allowing the administrator access to the network device. This provides assurance that the administrator has seen the message...
    Rule Low Severity
  • Forescout must generate log records when attempts to delete administrator privileges occur.

    Without generating log records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or i...
    Rule Low Severity
  • Forescout must generate log records showing when successful logon attempts occur.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • Forescout must generate log records for privileged activities or other system-level access.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • Forescout must generate log records when concurrent logons from different workstations occur.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • Forescout must be configured to synchronize internal information system clocks using redundant authoritative time sources.

    The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other ...
    Rule Medium Severity
  • Forescout must enforce access restrictions associated with changes to device configuration.

    Failure to provide logical access restrictions associated with changes to device configuration may have significant effects on the overall security of the system. For Forescout, ensure only autho...
    Rule Medium Severity
  • Forescout must enforce access restrictions associated with changes to the firmware, OS, USB port, and console port.

    Changes to the hardware or software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals must b...
    Rule Medium Severity
  • If the network device uses role-based access control, Forescout must enforce organization-defined, role-based access control policies over defined subjects and objects.

    Organizations can create specific roles based on job functions and the authorizations (i.e., privileges) to perform needed operations on organizational information systems associated with the organ...
    Rule Medium Severity
  • Forescout must be configured to conduct backups of system-level information contained in the information system when changes occur.

    System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execu...
    Rule Medium Severity
  • Forescout must use DOD-approved PKI rather than proprietary or self-signed device certificates.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs. Forescout generates a key-pair and a Certificate Signing R...
    Rule High Severity
  • Forescout must disable the Request Customer Verification setting.

    To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable unused o...
    Rule Low Severity
  • Forescout must require that when a password is changed, the characters are changed in at least eight of the positions within the password.

    If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at ...
    Rule Low Severity
  • Forescout must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule High Severity
  • Forescout must only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).

    This requirement addresses the confidentiality and integrity of system information at rest (e.g., network device rule sets) when it is located on a storage device within the network device or as a ...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules