Skip to content

A10 Networks ADC NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000373-NDM-000298

    Group
  • The A10 Networks ADC must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.

    The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other ...
    Rule Medium Severity
  • SRG-APP-000374-NDM-000299

    Group
  • SRG-APP-000395-NDM-000310

    Group
  • The A10 Networks ADC must authenticate Network Time Protocol sources.

    If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will mak...
    Rule Medium Severity
  • SRG-APP-000411-NDM-000330

    Group
  • SRG-APP-000412-NDM-000331

    Group
  • The A10 Networks ADC must not use SNMP Versions 1 or 2.

    SNMP Versions 1 and 2 are not considered secure. Without the strong authentication and privacy that is provided by the SNMP Version 3 User-based Security Model (USM), an unauthorized user can gain ...
    Rule High Severity
  • SRG-APP-000515-NDM-000325

    Group
  • The A10 Networks ADC must off-load audit records onto a different system or media than the system being audited.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    Rule Medium Severity
  • SRG-APP-000148-NDM-000246

    Group
  • SRG-APP-000411-NDM-000330

    Group
  • The A10 Networks ADC must only allow the use of secure protocols that implement cryptographic mechanisms to protect the integrity of maintenance and diagnostic communications for nonlocal maintenance sessions.

    This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryp...
    Rule Medium Severity
  • SRG-APP-000038-NDM-000213

    Group
  • The A10 Networks ADC must restrict management connections to the management network.

    Remote administration is inherently dangerous because anyone with a sniffer and access to the right LAN segment could acquire the device account and password information. With this intercepted info...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    Group
  • The A10 Networks ADC must use DoD-approved PKI rather than proprietary or self-signed device certificates.

    For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000333

    Group
  • The A10 Networks ADC must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW CJCSM 6510.01B.

    By immediately displaying an alarm message, potential security violations can be identified more quickly even when administrators are not logged into the network device. An example of a mechanism t...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000338

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules