Forescout Network Access Control Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Forescout must be configured to apply dynamic ACLs that restrict the use of ports when non-entity endpoints are connected using MAC Authentication Bypass (MAB). This is required for compliance with C2C Step 4.
<VulnDiscussion>MAB is only one way of connecting non-entity endpoints, and can be defeated by spoofing the MAC address of an assumed authori...Rule Medium Severity -
SRG-NET-000273-NAC-000970
<GroupDescription></GroupDescription>Group -
Forescout must reveal error messages only to the Information System Security Officer (ISSO), Information System Security Manager (ISSM), and System Administrator (SA). This is required for compliance with C2C Step 1.
<VulnDiscussion>Ensuring the proper amount of information is provided to the Security Management staff is imperative to ensure role based acc...Rule Medium Severity -
SRG-NET-000088-NAC-000440
<GroupDescription></GroupDescription>Group -
Forescout must configure TCP for the syslog protocol to allow for detection by the central event server if communications is lost. This is required for compliance with C2C Step 1.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-NET-000343-NAC-001480
<GroupDescription></GroupDescription>Group -
Forescout switch module must only allow a maximum of one registered MAC address per access port. This is required for compliance with C2C Step 4.
<VulnDiscussion>Limiting the number of registered MAC addresses on a switch access port can help prevent a CAM table overflow attack. This ty...Rule Medium Severity -
Forescout must perform continuous detection and tracking of endpoint devices attached to the network. This is required for compliance with C2C Step 1.
<VulnDiscussion>Continuous scanning capabilities on the NAC provide visibility of devices that are connected to the switch ports. The NAC con...Rule Medium Severity -
SRG-NET-000148-NAC-000620
<GroupDescription></GroupDescription>Group -
Forescout must use TLS 1.2, at a minimum, to protect the confidentiality of information passed between the endpoint agent and Forescout for the purposes of client posture assessment. This is required for compliance with C2C Step 1.
<VulnDiscussion>Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...Rule Medium Severity -
SRG-NET-000525-NAC-002430
<GroupDescription></GroupDescription>Group -
Forescout that stores device keys must have a key management process that is FIPS-approved and protected by Advanced Encryption Standard (AES) block cipher algorithms. This is required for compliance with C2C Step 1.
<VulnDiscussion>The NAC that stores secret or private keys must use FIPS-approved key management technology and processes in the production a...Rule High Severity -
SRG-NET-000320-NAC-001200
<GroupDescription></GroupDescription>Group -
Communications between Forescout endpoint agent and the switch must transmit access authorization information via a protected path using a cryptographic mechanism. This is required for compliance with C2C Step 1.
<VulnDiscussion>Forescout solution assesses the compliance posture of each client and returns an access decision based on configured security...Rule Medium Severity -
SRG-NET-000492-NAC-002110
<GroupDescription></GroupDescription>Group -
Forescout must generate a log record when the client machine fails policy assessment because required security software is missing or has been deleted. This is required for compliance with C2C Step 1.
<VulnDiscussion>Generating log records with regard to modules and policies is an important part of maintaining proper cyber hygiene. Keeping ...Rule Medium Severity -
SRG-NET-000336-NAC-001390
<GroupDescription></GroupDescription>Group -
Forescout must be configured with a secondary log server, in case the primary log is unreachable. This is required for compliance with C2C Step 1.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-NET-000512-NAC-002310
<GroupDescription></GroupDescription>Group -
Forescout must deny network connection for endpoints that cannot be authenticated using an approved method. This is required for compliance with C2C Step 4.
<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Iden...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.