Skip to content

F5 BIG-IP Device Management Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must require that when a password is changed, the characters are changed in at least eight (8) of the positions within the password.

    <VulnDiscussion>If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...
    Rule Medium Severity
  • SRG-APP-000171-NDM-000258

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must only store encrypted representations of passwords.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...
    Rule Medium Severity
  • SRG-APP-000172-NDM-000259

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must only transmit encrypted representations of passwords.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...
    Rule Medium Severity
  • SRG-APP-000178-NDM-000264

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    &lt;VulnDiscussion&gt;To prevent the compromise of authentication information such as passwords during the authentication process, the feedback fro...
    Rule Medium Severity
  • SRG-APP-000179-NDM-000265

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...
    Rule Medium Severity
  • SRG-APP-000186-NDM-000266

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to terminate all management sessions after 10 minutes of inactivity.

    &lt;VulnDiscussion&gt;If a device management session or connection remains open after management is completed, it may be hijacked by an attacker an...
    Rule High Severity
  • SRG-APP-000319-NDM-000283

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to automatically audit account-enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestab...
    Rule Medium Severity
  • SRG-APP-000329-NDM-000287

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to audit the enforcement actions used to restrict access associated with changes to the device.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to ...
    Rule Medium Severity
  • SRG-APP-000435-NDM-000315

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000516-NDM-000341

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must automatically disable accounts after a 35-day period of account inactivity.

    &lt;VulnDiscussion&gt;Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • Upon successful logon, the BIG-IP appliance must be configured to notify the administrator of the date and time of the last logon.

    &lt;VulnDiscussion&gt;Administrators need to be aware of activity that occurs regarding their network device management account. Providing administ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • Upon successful logon, the BIG-IP appliance must be configured to notify the administrator of the number of unsuccessful logon attempts since the last successful logon.

    &lt;VulnDiscussion&gt;Administrators need to be aware of activity that occurs regarding their network device management account. Providing administ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Low Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce a 60-day maximum password lifetime restriction.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to generate alerts that can be forwarded to the administrators and Information System Security Officer (ISSO) when accounts are disabled.

    &lt;VulnDiscussion&gt;When application accounts are disabled, administrator accessibility is affected. Accounts are utilized for identifying indivi...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;If security personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for ...
    Rule Low Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to employ automated mechanisms to centrally apply authentication settings.

    &lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services i...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to employ automated mechanisms to centrally verify authentication settings.

    &lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services i...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000001-NDM-000200

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must limit the number of concurrent sessions to the Configuration Utility to 10 or an organization-defined number.

    &lt;VulnDiscussion&gt;Device management includes the ability to control the number of administrators and management sessions that manage a device. ...
    Rule Medium Severity
  • SRG-APP-000026-NDM-000208

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must automatically audit account creation.

    &lt;VulnDiscussion&gt;Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing...
    Rule Medium Severity
  • SRG-APP-000027-NDM-000209

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must automatically audit account modification.

    &lt;VulnDiscussion&gt;Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security...
    Rule Medium Severity
  • SRG-APP-000028-NDM-000210

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must automatically audit account-disabling actions.

    &lt;VulnDiscussion&gt;Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting acces...
    Rule Medium Severity
  • SRG-APP-000029-NDM-000211

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must automatically audit account removal actions.

    &lt;VulnDiscussion&gt;Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting acces...
    Rule Medium Severity
  • SRG-APP-000033-NDM-000212

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.

    &lt;VulnDiscussion&gt;To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...
    Rule High Severity
  • SRG-APP-000065-NDM-000214

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules