F5 BIG-IP Device Management Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must require that when a password is changed, the characters are changed in at least eight (8) of the positions within the password.
<VulnDiscussion>If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...Rule Medium Severity -
SRG-APP-000171-NDM-000258
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must only store encrypted representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule Medium Severity -
SRG-APP-000172-NDM-000259
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must only transmit encrypted representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule Medium Severity -
SRG-APP-000178-NDM-000264
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
<VulnDiscussion>To prevent the compromise of authentication information such as passwords during the authentication process, the feedback fro...Rule Medium Severity -
SRG-APP-000179-NDM-000265
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
<VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...Rule Medium Severity -
SRG-APP-000186-NDM-000266
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to terminate all management sessions after 10 minutes of inactivity.
<VulnDiscussion>If a device management session or connection remains open after management is completed, it may be hijacked by an attacker an...Rule High Severity -
SRG-APP-000319-NDM-000283
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to automatically audit account-enabling actions.
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestab...Rule Medium Severity -
SRG-APP-000329-NDM-000287
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to audit the enforcement actions used to restrict access associated with changes to the device.
<VulnDiscussion>Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to ...Rule Medium Severity -
SRG-APP-000435-NDM-000315
<GroupDescription></GroupDescription>Group -
SRG-APP-000516-NDM-000341
<GroupDescription></GroupDescription>Group -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must automatically disable accounts after a 35-day period of account inactivity.
<VulnDiscussion>Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.