Skip to content

ForeScout CounterACT NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516-NDM-000333

    Group
  • CounterACT must enable Threat Protection notifications to alert security personnel to Cyber events detected by a CounterACT IAW CJCSM 6510.01B.

    CJCSM 6510.01B, "Cyber Incident Handling Program", in subsection e.(6)(c) sets forth requirements for Cyber events detected by an automated system. By immediately displaying an alarm message, pote...
    Rule Medium Severity
  • SRG-APP-000408-NDM-000314

    Group
  • SRG-APP-000516-NDM-000337

    Group
  • SRG-APP-000142-NDM-000245

    Group
  • CounterACT must disable all unnecessary and/or nonsecure plugins.

    CounterACT is capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operatio...
    Rule High Severity
  • SRG-APP-000190-NDM-000267

    Group
  • SRG-APP-000190-NDM-000267

    Group
  • CounterACT must terminate all network connections associated with an SSH connection session upon Exit, session disconnection, or after 10 minutes of inactivity, except where prevented by documented and validated mission requirements.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity
  • SRG-APP-000231-NDM-000271

    Group
  • CounterACT must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Tim...
    Rule Medium Severity
  • SRG-APP-000373-NDM-000298

    Group
  • SRG-APP-000125-NDM-000241

    Group
  • If any logs are stored locally which are not sent to the centralized audit server, CounterACT must back up audit records at least every seven days onto a different system or system component than the system or component being audited.

    Protection of log data includes ensuring log data is not accidentally lost or deleted. Regularly backing up audit records to a different system or onto separate media than the system being audited ...
    Rule Medium Severity
  • SRG-APP-000133-NDM-000244

    Group
  • CounterACT must limit privileges to change the software resident within software libraries.

    Changes to any software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed ...
    Rule Medium Severity
  • SRG-APP-000169-NDM-000257

    Group
  • SRG-APP-000515-NDM-000325

    Group
  • CounterACT must sent audit logs to a centralized audit server (i.e., syslog server).

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    Rule Medium Severity
  • SRG-APP-000374-NDM-000299

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules