Skip to content

IBM Aspera Platform 4.2 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The IBM Aspera Console private/secret cryptographic keys file must be group-owned by root to prevent unauthorized read access.

    <VulnDiscussion>Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000333-ALG-000049

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Console must enforce password complexity by requiring at least fifteen characters, with at least one upper case letter, one lower case letter, one number, and one symbol.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • The IBM Aspera Platform must be configured to support centralized management and configuration.

    &lt;VulnDiscussion&gt;Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...
    Rule Medium Severity
  • SRG-NET-000131-ALG-000085

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Platform must not have unnecessary services and functions enabled.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of th...
    Rule Medium Severity
  • SRG-NET-000339-ALG-000090

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Console must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;For remote access to non-privileged accounts, the purpose of requiring a device that is separate from the information system ...
    Rule Medium Severity
  • SRG-NET-000098-ALG-000056

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Console must protect audit information from unauthorized read access.

    &lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means...
    Rule Medium Severity
  • SRG-NET-000101-ALG-000059

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Console must lock accounts after three unsuccessful login attempts within a 15-minute timeframe.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-NET-000053-ALG-000001

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must be configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the network ensures privacy and security no...
    Rule Low Severity
  • The IBM Aspera Console must protect audit tools from unauthorized access.

    &lt;VulnDiscussion&gt;Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...
    Rule Medium Severity
  • SRG-NET-000138-ALG-000063

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Console must be configured with a preestablished trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate user account access authorizations and privileges.

    &lt;VulnDiscussion&gt;User account and privilege validation must be centralized in order to prevent unauthorized access using changed or revoked pr...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000011

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Console feature must be configured to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-NET-000213-ALG-000107

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Console interactive session must be terminated after 10 minutes of inactivity for non-privileged and privileged sessions.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Console must prevent concurrent logins for all accounts.

    &lt;VulnDiscussion&gt;Limiting the number of current sessions per user is helpful in limiting risks related to DoS attacks. This requirement addre...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Console passwords must be prohibited from reuse for a minimum of five generations.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Console user account passwords must have a 60-day maximum password lifetime restriction.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the ...
    Rule Medium Severity
  • SRG-NET-000132-ALG-000087

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Console must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-NET-000063-ALG-000012

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Console must be configured to use NIST FIPS-validated cryptography to protect the integrity of file transfers.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule High Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000063-ALG-000012

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Console private/secret cryptographic keys file must be owned by root to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Console private/secret cryptographic keys file must have a mode of 0600 or less permissive to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000102-ALG-000060

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Console feature audit tools must be protected from unauthorized modification or deletion.

    &lt;VulnDiscussion&gt;Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...
    Rule Medium Severity
  • SRG-NET-000213-ALG-000107

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex interactive session must be terminated after 10 minutes of inactivity for non-privileged and privileged sessions.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Faspex private/secret cryptographic keys file must have a mode of 0600 or less permissive to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must allow the use of a temporary password for logins with an immediate change to a permanent password.

    &lt;VulnDiscussion&gt;Without providing this capability, an account may be created without a password. Non-repudiation cannot be guaranteed once an...
    Rule Medium Severity
  • SRG-NET-000041-ALG-000022

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must disable account identifiers after 35 days of inactivity.

    &lt;VulnDiscussion&gt;Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potenti...
    Rule Medium Severity
  • SRG-NET-000339-ALG-000090

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules