Skip to content

IBM DataPower Network Device Management Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The DataPower Gateway must audit the enforcement actions used to restrict access associated with changes to the device.

    <VulnDiscussion>Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to ...
    Rule Medium Severity
  • SRG-APP-000389-NDM-000306

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must require users to re-authenticate when privilege escalation or role changes occur.

    &lt;VulnDiscussion&gt;Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When device...
    Rule Medium Severity
  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must not use 0.0.0.0 as the management IP address.

    &lt;VulnDiscussion&gt;If 0.0.0.0 as the management IP address, the DataPower appliance will listen on all configured interfaces for management traf...
    Rule Medium Severity
  • The DataPower Gateway must use SNMPv3.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule High Severity
  • SRG-APP-000400-NDM-000313

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;Some authentication implementations can be configured to use cached authenticators. If cached authentication information is ...
    Rule Medium Severity
  • SRG-APP-000411-NDM-000330

    <GroupDescription></GroupDescription>
    Group
  • The IBM DataPower Gateway must only allow the use of protocols that implement cryptographic mechanisms to protect the integrity and confidentiality of management communications.

    &lt;VulnDiscussion&gt;This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead...
    Rule Medium Severity
  • SRG-APP-000515-NDM-000325

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must off-load audit records onto a different system or media than the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000333

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and in accordance with CJCSM 6510.01B.

    &lt;VulnDiscussion&gt;By immediately displaying an alarm message, potential security violations can be identified more quickly even when administra...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000334

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must generate audit log events for a locally developed list of auditable events.

    &lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000336

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must employ automated mechanisms to centrally manage authentication settings.

    &lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services i...
    Rule Medium Severity
  • The DataPower Gateway must employ automated mechanisms to centrally apply authentication settings.

    &lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services i...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000338

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules