HPE 3PAR StoreServ 3.3.x Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
The HPE 3PAR OS must be configured to enforce a minimum 15-character password length.
<VulnDiscussion>The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
The HPE 3PAR OS must be configured to display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...Rule Medium Severity -
SRG-OS-000341-GPOS-00132
<GroupDescription></GroupDescription>Group -
The HPE 3PAR operating system must be configured to allocate audit record storage capacity to store at least one week of audit records, even though all audit records are immediately sent to a centralized audit record storage system (SIEM).
<VulnDiscussion>To ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems need to be...Rule Medium Severity -
SRG-OS-000359-GPOS-00146
<GroupDescription></GroupDescription>Group -
The HPE 3PAR OS must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Medium Severity -
SRG-OS-000342-GPOS-00133
<GroupDescription></GroupDescription>Group -
The HPE 3PAR OS must be configured to offload audit records onto a different system or media from the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...Rule Medium Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
The HPE 3PAR OS must be configured to implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...Rule Medium Severity -
SRG-OS-000068-GPOS-00036
<GroupDescription></GroupDescription>Group -
The HPE 3PAR OS must map the authenticated identity to the user account for PKI-based authentication.
<VulnDiscussion>Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the indivi...Rule High Severity -
SRG-OS-000403-GPOS-00182
<GroupDescription></GroupDescription>Group -
The HPE 3PAR OS must be configured to only allow the use of DOD PKI-established certificate authorities for authentication in the establishment of protected sessions to the operating system.
<VulnDiscussion>Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...Rule Medium Severity -
SRG-OS-000001-GPOS-00001
<GroupDescription></GroupDescription>Group -
The HPE 3PAR OS must provide automated mechanisms for supporting account management functions via AD.
<VulnDiscussion>Enterprise environments make account management challenging and complex. A manual process for account management functions ad...Rule Medium Severity -
SRG-OS-000403-GPOS-00182
<GroupDescription></GroupDescription>Group -
The HPE 3PAR OS syslog-sec-client must be configured to perform mutual TLS authentication using a CA-signed client certificate.
<VulnDiscussion>Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.