Forescout Network Access Control Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Forescout must enforce the revocation of endpoint access authorizations when devices are removed from an authorization group. This is required for compliance with C2C Step 4.
<VulnDiscussion>Ensuring the conditions that are configured in policy have proper time limits set to reflect changes will allow for proper ac...Rule Medium Severity -
SRG-NET-000322-NAC-001220
<GroupDescription></GroupDescription>Group -
SRG-NET-000517-NAC-002370
<GroupDescription></GroupDescription>Group -
SRG-NET-000015-NAC-000080
<GroupDescription></GroupDescription>Group -
SRG-NET-000015-NAC-000020
<GroupDescription></GroupDescription>Group -
Forescout must enforce approved access by employing admissions assessment filters that include, at a minimum, device attributes such as type, IP address, resource group, and/or mission conditions as defined in Forescout System Security Plan (SSP). This is required for compliance with C2C Step 4.
<VulnDiscussion>Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authoriz...Rule High Severity -
SRG-NET-000015-NAC-000030
<GroupDescription></GroupDescription>Group -
Endpoint policy assessment must proceed after the endpoint attempting access has been identified using an approved identification method such as IP address. This is required for compliance with C2C Step 2.
<VulnDiscussion>Automated policy assessments must reflect the organization's current security policy so entry control decisions will happen o...Rule High Severity -
SRG-NET-000015-NAC-000040
<GroupDescription></GroupDescription>Group -
For endpoints that require automated remediation, Forescout must be configured to redirect endpoints to a logically separate network segment for remediation services. This is required for compliance with C2C Step 4.
<VulnDiscussion>Automated and manual procedures for remediation for critical security updates will be managed differently. Continuing to asse...Rule High Severity -
SRG-NET-000015-NAC-000060
<GroupDescription></GroupDescription>Group -
If a device requesting access fails Forescout policy assessment, Forescout must communicate with other components and the switch to either terminate the session or isolate the device from the trusted network for remediation. This is required for compliance with C2C Step 3.
<VulnDiscussion>Endpoints with identified security flaws and weaknesses endanger the network and other devices on it. Isolation or terminatio...Rule High Severity -
SRG-NET-000015-NAC-000070
<GroupDescription></GroupDescription>Group -
Forescout must be configured to notify the user before proceeding with remediation of the user's endpoint device when automated remediation is used. This is required for compliance with C2C Step 3.
<VulnDiscussion>Connections that bypass established security controls should be allowed only in cases of administrative need. These procedure...Rule Medium Severity -
Forescout must be configured so that all client machines are assessed by Forescout with exceptions that are allowed to bypass Forescout based on account or account type, as approved by the information system security manager (ISSM) and documented in the System Security Plan (SSP). This is required for compliance with C2C Step 1.
<VulnDiscussion>The NAC gateway provides the policy enforcement allowing or denying the endpoint to the network. Unauthorized endpoints that ...Rule High Severity -
SRG-NET-000015-NAC-000090
<GroupDescription></GroupDescription>Group -
Forescout appliance must not be configured to implement a DHCP layer 3 method for separation or device authorization. This is required for compliance with C2C Step 2.
<VulnDiscussion>An internal rogue device can still bypass the authentication process, regardless of the policy flow. Configuring the NAC to p...Rule High Severity -
SRG-NET-000015-NAC-000100
<GroupDescription></GroupDescription>Group -
Forescout must send an alert to the Information System Security Manager (ISSM) and System Administrator (SA), at a minimum, when critical security issues are found that put the network at risk. This is required for compliance with C2C Step 2.
<VulnDiscussion>Requiring authentication and authorization of both the user's identity and the identity of the computing device is essential ...Rule Medium Severity -
SRG-NET-000015-NAC-000110
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.