DBN-6300 NDM Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000156-NDM-000250
<GroupDescription></GroupDescription>Group -
The DBN-6300 must implement replay-resistant authentication mechanisms for network access to privileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule Medium Severity -
SRG-APP-000164-NDM-000252
<GroupDescription></GroupDescription>Group -
The DBN-6300 must enforce a minimum 15-character password length.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-APP-000165-NDM-000253
<GroupDescription></GroupDescription>Group -
The DBN-6300 must prohibit password reuse for a minimum of five generations.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
If multifactor authentication is not supported and passwords must be used, the DBN-6300 must enforce password complexity by requiring that at least one upper-case character be used.
<VulnDiscussion>Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...Rule Medium Severity -
SRG-APP-000167-NDM-000255
<GroupDescription></GroupDescription>Group -
If multifactor authentication is not supported and passwords must be used, the DBN-6300 must enforce password complexity by requiring that at least one lower-case character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000168-NDM-000256
<GroupDescription></GroupDescription>Group -
If multifactor authentication is not supported and passwords must be used, the DBN-6300 must enforce password complexity by requiring that at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000169-NDM-000257
<GroupDescription></GroupDescription>Group -
If multifactor authentication is not supported and passwords must be used, the DBN-6300 must enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000173-NDM-000260
<GroupDescription></GroupDescription>Group -
The DBN-6300 must enforce 24 hours/1 day as the minimum password lifetime.
<VulnDiscussion>Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforce...Rule Medium Severity -
SRG-APP-000174-NDM-000261
<GroupDescription></GroupDescription>Group -
The DBN-6300 must enforce a 60-day maximum password lifetime restriction.
<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals...Rule Medium Severity -
SRG-APP-000190-NDM-000267
<GroupDescription></GroupDescription>Group -
The DBN-6300 must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule High Severity -
SRG-APP-000267-NDM-000273
<GroupDescription></GroupDescription>Group -
The DBN-6300 must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-APP-000268-NDM-000274
<GroupDescription></GroupDescription>Group -
The DBN-6300 must activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
<VulnDiscussion>Predictable failure prevention requires organizational planning to address device failure issues. If components key to mainta...Rule Medium Severity -
SRG-APP-000295-NDM-000279
<GroupDescription></GroupDescription>Group -
The DBN-6300 must automatically terminate a network administrator session after organization-defined conditions or trigger events requiring session disconnect.
<VulnDiscussion>Automatic session termination addresses the termination of administrator-initiated logical sessions in contrast to the termin...Rule Medium Severity -
SRG-APP-000319-NDM-000283
<GroupDescription></GroupDescription>Group -
The DBN-6300 must automatically audit account enabling actions.
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestab...Rule Medium Severity -
SRG-APP-000343-NDM-000289
<GroupDescription></GroupDescription>Group -
The DBN-6300 must audit the execution of privileged functions.
<VulnDiscussion>Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external enti...Rule Medium Severity -
SRG-APP-000353-NDM-000292
<GroupDescription></GroupDescription>Group -
The DBN-6300 must provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near real time.
<VulnDiscussion>If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment,...Rule Low Severity -
SRG-APP-000371-NDM-000296
<GroupDescription></GroupDescription>Group -
The DBN-6300 must compare internal information system clocks at least every 24 hours with an authoritative time server.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity -
The DBN-6300 must synchronize its internal system clock to the NTP server when the time difference is greater than one second.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity -
SRG-APP-000374-NDM-000299
<GroupDescription></GroupDescription>Group -
The DBN-6300 must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Medium Severity -
SRG-APP-000375-NDM-000300
<GroupDescription></GroupDescription>Group -
The DBN-6300 must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
<VulnDiscussion>Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records....Rule Medium Severity -
SRG-APP-000381-NDM-000305
<GroupDescription></GroupDescription>Group -
The DBN-6300 must audit the enforcement actions used to restrict access associated with changes to the device.
<VulnDiscussion>Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to ...Rule Medium Severity -
SRG-APP-000411-NDM-000330
<GroupDescription></GroupDescription>Group -
Applications used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.
<VulnDiscussion>This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead...Rule Medium Severity -
SRG-APP-000412-NDM-000331
<GroupDescription></GroupDescription>Group -
Applications used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.
<VulnDiscussion>This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead...Rule Medium Severity -
SRG-APP-000495-NDM-000318
<GroupDescription></GroupDescription>Group -
The DBN-6300 must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000499-NDM-000319
<GroupDescription></GroupDescription>Group -
The DBN-6300 must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000503-NDM-000320
<GroupDescription></GroupDescription>Group -
The DBN-6300 must generate audit records when successful/unsuccessful logon attempts occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.