Skip to content

Forescout Network Device Management Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000001-NDM-000200

    Group
  • Forescout must limit the number of concurrent sessions to one for each administrator account.

    Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administr...
    Rule Low Severity
  • SRG-APP-000317-NDM-000282

    Group
  • Forescout must terminate the account of last resort password when members with access to the password leave the group.

    A shared/group account credential is a shared form of authentication that allows multiple individuals to access the network device using a single account. If shared/group account credentials are no...
    Rule Medium Severity
  • SRG-APP-000148-NDM-000346

    Group
  • SRG-APP-000065-NDM-000214

    Group
  • Forescout must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    Group
  • SRG-APP-000069-NDM-000216

    Group
  • SRG-APP-000091-NDM-000223

    Group
  • Forescout must generate log records when successful attempts to access privileges occur.

    Without generating log records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or i...
    Rule Low Severity
  • SRG-APP-000495-NDM-000318

    Group
  • Forescout must generate log records when attempts to modify administrator privileges occur.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000499-NDM-000319

    Group
  • SRG-APP-000503-NDM-000320

    Group
  • SRG-APP-000504-NDM-000321

    Group
  • SRG-APP-000505-NDM-000322

    Group
  • Forescout must generate log records showing starting and ending time for administrator access to the system.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000506-NDM-000323

    Group
  • SRG-APP-000515-NDM-000325

    Group
  • The Forescout must configure a remote syslog where audit records are stored on a centralized logging target that is different from the system being audited.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    Rule Low Severity
  • SRG-APP-000373-NDM-000298

    Group
  • SRG-APP-000374-NDM-000299

    Group
  • Forescout must be configured to use Coordinated Universal Time (UTC).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Tim...
    Rule Medium Severity
  • SRG-APP-000378-NDM-000302

    Group
  • Forescout must prohibit installation of software without explicit privileged permission by only authorized individuals.

    Allowing anyone to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. This requirement applies to code ...
    Rule Medium Severity
  • SRG-APP-000380-NDM-000304

    Group
  • SRG-APP-000381-NDM-000305

    Group
  • Forescout must audit the enforcement actions used to restrict access associated with changes to the device.

    Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to identify attempted attacks, and an audit trail will not be available for...
    Rule Low Severity
  • SRG-APP-000131-NDM-000243

    Group
  • Forescout must prevent the installation of patches, service packs, plug-ins, or modules without verification the update has been digitally signed using a certificate that is recognized and approved by the organization.

    Changes to any software components can have significant effects on the overall security of the network device. Verifying software components have been digitally signed using a certificate that is r...
    Rule Low Severity
  • SRG-APP-000133-NDM-000244

    Group
  • Forescout must limit privileges to change the modules and OSs resident within software libraries.

    Changes to any software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals must be allowed ad...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000335

    Group
  • SRG-APP-000516-NDM-000336

    Group
  • Forescout must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.

    Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With ro...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000351

    Group
  • Forescout must be running an operating system release that is currently supported by the vendor.

    Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities. In Oct 2021, there is plan to make Versio...
    Rule Medium Severity
  • SRG-APP-000329-NDM-000287

    Group
  • SRG-APP-000516-NDM-000334

    Group
  • Forescout must generate log records for a locally developed list of auditable events.

    Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000340

    Group
  • SRG-APP-000516-NDM-000341

    Group
  • Forescout must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.

    System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execu...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    Group
  • Forescout must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

    For user certificates, each organization obtains certificates from an approved shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure ...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    Group
  • SRG-APP-000142-NDM-000245

    Group
  • SRG-APP-000395-NDM-000310

    Group
  • Forescout must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).

    Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules