Skip to content

DBN-6300 NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The DBN-6300 must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-APP-000503-NDM-000320

    Group
  • The DBN-6300 must generate audit records when successful/unsuccessful logon attempts occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-APP-000504-NDM-000321

    Group
  • SRG-APP-000505-NDM-000322

    Group
  • Accounts for device management must be configured on the authentication server and not the network device itself, except for the account of last resort.

    Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With r...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    Group
  • SRG-APP-000506-NDM-000323

    Group
  • The DBN-6300 must generate audit records when concurrent logons from different workstations occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-APP-000509-NDM-000324

    Group
  • The DBN-6300 must generate audit records for all account creation, modification, disabling, and termination events.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-APP-000515-NDM-000325

    Group
  • SRG-APP-000516-NDM-000317

    Group
  • The DBN-6300 must be configured to send log data to a syslog server for the purpose of forwarding alerts to the administrators and the ISSO.

    Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to create...
    Rule High Severity
  • SRG-APP-000516-NDM-000336

    Group
  • The DBN-6300 must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

    For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure...
    Rule Medium Severity
  • The DBN-6300 must automatically audit account creation.

    Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. This con...
    Rule Medium Severity
  • The DBN-6300 must automatically audit account modification.

    Upon gaining access to a network device, an attacker will often attempt to create a persistent method of reestablishing access. One way to accomplish this is to modify an account. This control does...
    Rule Medium Severity
  • The DBN-6300 must be compliant with at least one IETF Internet standard authentication protocol.

    Protecting access authorization information (i.e., access control decisions) ensures that authorization information cannot be altered, spoofed, or otherwise compromised during transmission. In dis...
    Rule Medium Severity
  • The DBN-6300 must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. It is possible to set a time-to-re...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules