Forescout Network Access Control Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
When devices fail the policy assessment, Forescout must create a record with sufficient detail suitable for forwarding to a remediation server for automated remediation or sending to the user for manual remediation. This is required for compliance with C2C Step 3.
<VulnDiscussion>Notifications sent to the user and/or network administrator informing them of remediation requirements will ensure that actio...Rule Medium Severity -
SRG-NET-000015-NAC-000120
<GroupDescription></GroupDescription>Group -
Forescout must place client machines on a blacklist or terminate network communications on devices when critical security issues are found that put the network at risk. This is required for compliance with C2C Step 4.
<VulnDiscussion>Devices that are found to have critical security issues place the network at risk if they are allowed to continue communicati...Rule High Severity -
SRG-NET-000015-NAC-000130
<GroupDescription></GroupDescription>Group -
Forescout must be configured so client machines do not communicate with other network devices in the DMZ or subnet except as needed to perform a client assessment or to identify itself. This is required for compliance with C2C Step 2.
<VulnDiscussion>Devices not compliant with DoD secure configuration policies are vulnerable to attack. Allowing these systems to connect pres...Rule Medium Severity -
SRG-NET-000321-NAC-001210
<GroupDescription></GroupDescription>Group -
Forescout must enforce the revocation of endpoint access authorizations at the next compliance assessment interval based on changes to the compliance assessment security policy. This is required for compliance with C2C Step 4.
<VulnDiscussion>This requirement gives the option to configure for automated remediation and/or manual remediation. A detailed record must be...Rule Medium Severity -
SRG-NET-000322-NAC-001230
<GroupDescription></GroupDescription>Group -
Forescout must deny or restrict access for endpoints that fail critical endpoint security checks. This is required for compliance with C2C Step 4.
<VulnDiscussion>Devices that do not meet minimum-security configuration requirements pose a risk to the DoD network and information assets. ...Rule Medium Severity -
SRG-NET-000333-NAC-001340
<GroupDescription></GroupDescription>Group -
Forescout must be configured to log records onto a centralized events server. This is required for compliance with C2C Step 1.
<VulnDiscussion>Keeping an established, connection-oriented audit record is essential to keeping audit logs in accordance with DoD requiremen...Rule Medium Severity -
SRG-NET-000334-NAC-001350
<GroupDescription></GroupDescription>Group -
Forescout must off-load log records onto a different system. This is required for compliance with C2C Step 1.
<VulnDiscussion>Having a separate, secure location for log records is essential to the preservation of logs as required by policy.</VulnDi...Rule Medium Severity -
SRG-NET-000335-NAC-001360
<GroupDescription></GroupDescription>Group -
Forescout must generate a critical alert to be sent to the Information System Security Officer (ISSO) and Systems Administrator (SA) (at a minimum) in the event of an audit processing failure. This is required for compliance with C2C Step 1.
<VulnDiscussion>Ensuring that a security solution alerts in the event of misconfiguration or error is imperative to ensuring that proper audi...Rule Medium Severity -
SRG-NET-000343-NAC-001460
<GroupDescription></GroupDescription>Group -
For TLS connections, Forescout must automatically terminate the session when a client certificate is requested and the client does not have a suitable certificate. This is required for compliance with C2C Step 1.
<VulnDiscussion>In accordance with NIST SP 800-52, the TLS server must terminate the connection with a fatal “handshake failure” alert when a...Rule Medium Severity -
SRG-NET-000062-NAC-000340
<GroupDescription></GroupDescription>Group -
Forescout must authenticate all endpoint devices before establishing a connection and proceeding with posture assessment. This is required for compliance with C2C Step 4.
<VulnDiscussion>Authenticating all devices as they connect to the network is the baseline of a good security solution. This is especially imp...Rule Medium Severity -
SRG-NET-000343-NAC-001470
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.