Storage Area Network STIG
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SAN Switch encryption and DOD PKI
<GroupDescription></GroupDescription>Group -
The fabric switches must use DoD-approved PKI rather than proprietary or self-signed device certificates.
<VulnDiscussion>DOD PKI supplies better protection from malicious attacks than userid/password authentication and should be used anytime it i...Rule Low Severity -
SAN Network Management Ports Fabric Switch
<GroupDescription></GroupDescription>Group -
Network management ports on the SAN fabric switches except those needed to support the operational commitments of the sites are not disabled.
<VulnDiscussion>Enabled network management ports that are not required expose the SAN fabric switch and the entire network to unnecessary vul...Rule Medium Severity -
SAN management out-of-band or direct connect
<GroupDescription></GroupDescription>Group -
SAN management is not accomplished using the out-of-band or direct connection method.
<VulnDiscussion>Removing the management traffic from the production network diminishes the security profile of the SAN servers by allowing al...Rule Medium Severity -
Management Console to SAN Fabric Authentication
<GroupDescription></GroupDescription>Group -
Communications from the management console to the SAN fabric are not protected strong two-factor authentication.
<VulnDiscussion>Using two-factor authentication between the SAN management console and the fabric enhances the security of the communications...Rule Low Severity -
Default PKI keys
<GroupDescription></GroupDescription>Group -
FIPS 140-1/2 for management to fabric.
<GroupDescription></GroupDescription>Group -
The SAN is not configured to use FIPS 140-1/2 validated encryption algorithm to protect management-to-fabric communications.
<VulnDiscussion>The communication between the SAN management consol and the SAN fabric carries sensitive privileged configuration data. This...Rule Low Severity -
Password SAN Management Console and Ports
<GroupDescription></GroupDescription>Group -
All SAN management consoles and ports are not password protected.
<VulnDiscussion>Without password protection malicious users can create a denial of service by disrupting the SAN or allow the compromise of s...Rule High Severity -
Default SAN Management Software Password
<GroupDescription></GroupDescription>Group -
The SAN fabric zoning lists are not based on a policy of Deny-by-Default with blocks on all services and protocols not required on the given port or by the site.
<VulnDiscussion>By using the Deny-by-Default based policy, any service or protocol not required by a port and overlooked in the zoning list w...Rule High Severity -
Logging Failed Access to Port, Protocols, Services
<GroupDescription></GroupDescription>Group -
Attempts to access ports, protocols, or services that are denied are not logged..
<VulnDiscussion>Logging or auditing of failed access attempts is a necessary component for the forensic investigation of security incidents. ...Rule Low Severity -
SNMP usage and configuration.
<GroupDescription></GroupDescription>Group -
Simple Network Management Protocol (SNMP) is used and it is not configured in accordance with the guidance contained in the Network Infrastructure STIG.
<VulnDiscussion>There are vulnerabilities in some implementations and some configurations of SNMP. Therefore if SNMP is used the guidelines ...Rule Medium Severity -
Authorized IP Addresses allowed for SNMP
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.