ForeScout CounterACT ALG Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000041-ALG-000022
<GroupDescription></GroupDescription>Group -
If user authentication services are provided, CounterACT must be configured with a pre-established trust relationship and mechanisms with a central directory service that validates user account access authorizations and privileges.
<VulnDiscussion>User account and privilege validation must be centralized in order to prevent unauthorized access using changed or revoked pr...Rule Medium Severity -
SRG-NET-000138-ALG-000089
<GroupDescription></GroupDescription>Group -
If user authentication services are provided, CounterACT must restrict user authentication traffic to specific authentication server(s).
<VulnDiscussion>User authentication can be used as part of the policy filtering rule sets. Some URLs or network resources can be restricted t...Rule Medium Severity -
CounterACT, when providing user access control intermediary services, must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the network ensures privacy and security no...Rule Medium Severity -
SRG-NET-000042-ALG-000023
<GroupDescription></GroupDescription>Group -
CounterACT, when providing user access control intermediary services, must retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
<VulnDiscussion>The banner must be acknowledged by the user prior to allowing the user access to the network. This provides assurance that th...Rule Low Severity -
SRG-NET-000043-ALG-000024
<GroupDescription></GroupDescription>Group -
CounterACT, when providing user access control intermediary services for publicly accessible applications, must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the publicly accessible network element ens...Rule Medium Severity -
SRG-NET-000088-ALG-000054
<GroupDescription></GroupDescription>Group -
CounterACT must send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-NET-000138-ALG-000088
<GroupDescription></GroupDescription>Group -
SRG-NET-000147-ALG-000095
<GroupDescription></GroupDescription>Group -
CounterACT, when providing user authentication intermediary services, must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule Medium Severity -
SRG-NET-000334-ALG-000050
<GroupDescription></GroupDescription>Group -
CounterACT must off-load audit records onto a centralized log server.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-NET-000337-ALG-000096
<GroupDescription></GroupDescription>Group -
CounterACT, when providing user authentication intermediary services, must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
<VulnDiscussion>Without reauthentication, users may access resources or perform tasks for which they do not have authorization. In addition ...Rule Medium Severity -
SRG-NET-000339-ALG-000090
<GroupDescription></GroupDescription>Group -
CounterACT, when providing user authentication intermediary services, must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
<VulnDiscussion>For remote access to non-privileged accounts, the purpose of requiring a device that is separate from the information system ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.