Skip to content

Multifunction Device and Network Printers STIG

Rules, Groups, and Values defined within the XCCDF Benchmark

  • MFD/Printer Firewall/Router Rule Perimeter

    <GroupDescription></GroupDescription>
    Group
  • A firewall or router rule must block all ingress and egress traffic from the enclave perimeter to the MFD or Network Printer.

    &lt;VulnDiscussion&gt;Access to the MFD or printer from outside the enclave network could lead to a denial of service caused by a large number of l...
    Rule Medium Severity
  • MFD Firmware

    <GroupDescription></GroupDescription>
    Group
  • The MFD or Network Printer must employ the most current firmware available.

    &lt;VulnDiscussion&gt;MFD devices or printers utilizing old firmware can expose the network to known vulnerabilities leading to a denial of service...
    Rule Medium Severity
  • MFD SNMP Community Strings

    <GroupDescription></GroupDescription>
    Group
  • The default passwords and SNMP community strings of all management services have not been replaced with complex passwords.

    &lt;VulnDiscussion&gt;There are many known vulnerabilities in the SNMP protocol and if the default community strings and passwords are not modified...
    Rule High Severity
  • MFD Configuration State After Power Down or Reboot

    <GroupDescription></GroupDescription>
    Group
  • The MFD or Network Printer must maintain configuration state (e.g., passwords, service settings) after a power down or restart.

    &lt;VulnDiscussion&gt;If the MFD does not maintain it state over a power down or restart, it will expose the network to all of the vulnerabilities ...
    Rule High Severity
  • MFD Management Protocols

    <GroupDescription></GroupDescription>
    Group
  • Management protocols, with the exception of HTTPS and SNMPv3, must be disabled at all times except when necessary.

    &lt;VulnDiscussion&gt;Unneeded protocols expose the device and the network to unnecessary vulnerabilities.&lt;/VulnDiscussion&gt;&lt;FalsePositives...
    Rule Medium Severity
  • MFD or a printer can be managed from any IP

    <GroupDescription></GroupDescription>
    Group
  • There is no restriction on where a MFD or a printer can be remotely managed.

    &lt;VulnDiscussion&gt;Since unrestricted access to the MFD or printer for management is not required the restricting the management interface to sp...
    Rule High Severity
  • Print Services Restricted to Port 9100 and/or LPD

    <GroupDescription></GroupDescription>
    Group
  • Print services for a MFD or printer are not restricted to Port 9100 and/or LPD (Port 515). Where both Windows and non-Windows clients need services from the same device, both Port 9100 and LPD can be enabled simultaneously.

    &lt;VulnDiscussion&gt;Printer services running on ports other than the known ports for printing cannot be monitored on the network and could lead t...
    Rule Low Severity
  • MFD/Printer Restrict Jobs Only From Print Spooler

    <GroupDescription></GroupDescription>
    Group
  • A MFD or printer is not configured to restrict jobs to those from print spoolers.

    &lt;VulnDiscussion&gt;If MFDs or printers are not restricted to accept print jobs only from print spoolers that authenticate the user and log the j...
    Rule Medium Severity
  • MFD Authorized Users Restrictions

    <GroupDescription></GroupDescription>
    Group
  • Print spoolers are not configured to restrict access to authorized users and restrict users to managing their own individual jobs.

    &lt;VulnDiscussion&gt;If unauthorized users are allowed access to the print spooler they can queue large print file creating a denial of service fo...
    Rule Medium Severity
  • MFD and Spooler Auditing

    <GroupDescription></GroupDescription>
    Group
  • The devices and their spoolers do not have auditing enabled.

    &lt;VulnDiscussion&gt;Without auditing the identification and prosecution of an individual that performs malicious actions is difficult if not impo...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules