Skip to content

F5 BIG-IP Device Management Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000121-NDM-000238

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to protect audit tools from unauthorized access.

    &lt;VulnDiscussion&gt;Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000153-NDM-000249

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to ensure administrators are authenticated with an individual authenticator prior to using a group authenticator.

    &lt;VulnDiscussion&gt;To assure individual accountability and prevent unauthorized access, administrators must be individually identified and authe...
    Rule Medium Severity
  • SRG-APP-000164-NDM-000252

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000166-NDM-000254

    <GroupDescription></GroupDescription>
    Group
  • If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one upper-case character be used.

    &lt;VulnDiscussion&gt;Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...
    Rule Medium Severity
  • SRG-APP-000167-NDM-000255

    <GroupDescription></GroupDescription>
    Group
  • If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one lower-case character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000168-NDM-000256

    <GroupDescription></GroupDescription>
    Group
  • If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one numeric character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000169-NDM-000257

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.

    &lt;VulnDiscussion&gt;Organizations can create specific roles based on job functions and the authorizations (i.e., privileges) to perform needed op...
    Rule Medium Severity
  • SRG-APP-000357-NDM-000293

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    &lt;VulnDiscussion&gt;In order to ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able ...
    Rule Medium Severity
  • SRG-APP-000373-NDM-000298

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.

    &lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules