IBM Aspera Platform 4.2 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
IBM Aspera Faspex passwords must be prohibited from reuse for a minimum of five generations.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-NET-000512-ALG-000062
<GroupDescription></GroupDescription>Group -
IBM Aspera Faspex user account passwords must have a 60-day maximum password lifetime restriction.
<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the ...Rule Medium Severity -
SRG-NET-000062-ALG-000011
<GroupDescription></GroupDescription>Group -
The IBM Aspera Faspex feature must be configured to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-NET-000132-ALG-000087
<GroupDescription></GroupDescription>Group -
IBM Aspera Faspex must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity -
SRG-NET-000138-ALG-000063
<GroupDescription></GroupDescription>Group -
IBM Aspera Faspex must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
<VulnDiscussion>To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...Rule Medium Severity -
IBM Aspera Faspex must be configured to use NIST FIPS-validated cryptography to protect the integrity of file transfers.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.