Skip to content

Network WLAN AP-NIPR Management Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516-NDM-000351

    Group
  • The network device must be running an operating system release that is currently supported by the vendor.

    Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities.
    Rule High Severity
  • SRG-APP-000516-NDM-000336

    Group
  • The network device must be configured to use an authentication server to authenticate users prior to granting administrative access.

    Centralized management of authentication settings increases the security of remote and nonlocal access methods. This is particularly important protection against the insider threat. With robust cen...
    Rule High Severity
  • SRG-APP-000395-NDM-000310

    Group
  • SRG-APP-000148-NDM-000346

    Group
  • SRG-APP-000065-NDM-000214

    Group
  • The network device must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced.
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    Group
  • The network device must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.

    To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable unused o...
    Rule High Severity
  • SRG-APP-000395-NDM-000347

    Group
  • The network device must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.

    If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will mak...
    Rule Medium Severity
  • SRG-APP-000156-NDM-000250

    Group
  • SRG-APP-000516-NDM-000335

    Group
  • The network device must be configured with both an ingress and egress ACL.

    Changes to the hardware or software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should...
    Rule Medium Severity
  • SRG-APP-000373-NDM-000298

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules