Skip to content

F5 BIG-IP Device Management Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000068-NDM-000215

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.

    &lt;VulnDiscussion&gt;Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notifi...
    Rule Low Severity
  • SRG-APP-000080-NDM-000220

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to protect against an individual (or process acting on behalf of an individual) falsely denying having performed system configuration changes.

    &lt;VulnDiscussion&gt;This requirement supports non-repudiation of actions taken by an administrator and is required in order to maintain the integ...
    Rule Medium Severity
  • SRG-APP-000119-NDM-000236

    <GroupDescription></GroupDescription>
    Group
  • If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000170-NDM-000329

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to protect audit information from unauthorized modification.

    &lt;VulnDiscussion&gt;Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully au...
    Rule Medium Severity
  • SRG-APP-000120-NDM-000237

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to protect audit information from unauthorized deletion.

    &lt;VulnDiscussion&gt;Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully au...
    Rule Medium Severity
  • SRG-APP-000121-NDM-000238

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to protect audit tools from unauthorized access.

    &lt;VulnDiscussion&gt;Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000153-NDM-000249

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to ensure administrators are authenticated with an individual authenticator prior to using a group authenticator.

    &lt;VulnDiscussion&gt;To assure individual accountability and prevent unauthorized access, administrators must be individually identified and authe...
    Rule Medium Severity
  • SRG-APP-000164-NDM-000252

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000166-NDM-000254

    <GroupDescription></GroupDescription>
    Group
  • If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one upper-case character be used.

    &lt;VulnDiscussion&gt;Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...
    Rule Medium Severity
  • SRG-APP-000167-NDM-000255

    <GroupDescription></GroupDescription>
    Group
  • If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one lower-case character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000168-NDM-000256

    <GroupDescription></GroupDescription>
    Group
  • If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one numeric character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000169-NDM-000257

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.

    &lt;VulnDiscussion&gt;Organizations can create specific roles based on job functions and the authorizations (i.e., privileges) to perform needed op...
    Rule Medium Severity
  • SRG-APP-000357-NDM-000293

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    &lt;VulnDiscussion&gt;In order to ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able ...
    Rule Medium Severity
  • SRG-APP-000373-NDM-000298

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.

    &lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...
    Rule Medium Severity
  • SRG-APP-000380-NDM-000304

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce access restrictions associated with changes to device configuration.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to device configuration may have significant effects o...
    Rule Medium Severity
  • SRG-APP-000381-NDM-000305

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to protect against or limit the effects of all known types of Denial of Service (DoS) attacks on the BIG-IP appliance management network by limiting the number of concurrent sessions.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule High Severity
  • SRG-APP-000515-NDM-000325

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to off-load audit records onto a different system or media than the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuring the network device to implement organization-wide security implementation guides and security checklists ensures ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000336

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to employ automated mechanisms to centrally manage authentication settings.

    &lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services i...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000340

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must create backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.

    &lt;VulnDiscussion&gt;System-level information includes default and customized settings and security attributes, including ACLs that relate to the ...
    Rule Low Severity
  • The BIG-IP appliance must be configured to create backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.

    &lt;VulnDiscussion&gt;Information system backup is a critical step in maintaining data assurance and availability. Information system and security-...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to obtain its public key certificates from an appropriate certificate policy through a DoD-approved service provider.

    &lt;VulnDiscussion&gt;For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB p...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP must ensure SSH is disabled for root user logon to prevent remote access using the root account.

    &lt;VulnDiscussion&gt;The F5 BIG-IP shell must be locked down to limit the ability to modify the configuration through the shell. Preventing attack...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must provide automated support for account management functions.

    &lt;VulnDiscussion&gt;Account management functions include: assignment of group or role membership; identifying account type; specifying user acces...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules