F5 BIG-IP Device Management Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Upon successful logon, the BIG-IP appliance must be configured to notify the administrator of the date and time of the last logon.
<VulnDiscussion>Administrators need to be aware of activity that occurs regarding their network device management account. Providing administ...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
Upon successful logon, the BIG-IP appliance must be configured to notify the administrator of the number of unsuccessful logon attempts since the last successful logon.
<VulnDiscussion>Administrators need to be aware of activity that occurs regarding their network device management account. Providing administ...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Low Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to enforce a 60-day maximum password lifetime restriction.
<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to generate alerts that can be forwarded to the administrators and Information System Security Officer (ISSO) when accounts are disabled.
<VulnDiscussion>When application accounts are disabled, administrator accessibility is affected. Accounts are utilized for identifying indivi...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
<VulnDiscussion>If security personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for ...Rule Low Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to employ automated mechanisms to centrally apply authentication settings.
<VulnDiscussion>The use of authentication servers or other centralized management servers for providing centralized authentication services i...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to employ automated mechanisms to centrally verify authentication settings.
<VulnDiscussion>The use of authentication servers or other centralized management servers for providing centralized authentication services i...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
SRG-APP-000001-NDM-000200
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must limit the number of concurrent sessions to the Configuration Utility to 10 or an organization-defined number.
<VulnDiscussion>Device management includes the ability to control the number of administrators and management sessions that manage a device. ...Rule Medium Severity -
SRG-APP-000026-NDM-000208
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must automatically audit account creation.
<VulnDiscussion>Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.