Skip to content

SEL-2740S NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000412-NDM-000331

    <GroupDescription></GroupDescription>
    Group
  • The SEL-2740S must be adopted by OTSDN Controllers for secure communication identifiers and initial trust for configuration of remote maintenance and diagnostic communications.

    &lt;VulnDiscussion&gt;This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead...
    Rule High Severity
  • SRG-APP-000435-NDM-000315

    <GroupDescription></GroupDescription>
    Group
  • The SEL-2740S must be configured to permit the maintenance and diagnostics communications to specified OTSDN Controller(s).

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    <GroupDescription></GroupDescription>
    Group
  • The SEL-2740S must be adopted by OTSDN Controller(s) and obtain its public key certificates from an appropriate certificate policy through an approved service provider.

    &lt;VulnDiscussion&gt;For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB p...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The SEL-2740S must be configured to establish trust relationships with parent OTSDN Controller(s).

    &lt;VulnDiscussion&gt;Machine to machine initial trust must be established between the OTSDN controller and the SEL-2740S for authenticating all co...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The SEL-2740S must be configured to send log data to a syslog server for the purpose of forwarding alerts to the administrators and the ISSO.

    &lt;VulnDiscussion&gt;Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestab...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules