Skip to content

AAA Services Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000375

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured with a minimum granularity of one second to record time stamps for audit records.

    &lt;VulnDiscussion&gt;Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records....
    Rule Medium Severity
  • AAA Services must be configured to notify the system administrators (SAs) and information system security officer (ISSO) for account removal actions.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for ide...
    Rule Medium Severity
  • SRG-APP-000319

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to automatically audit account enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestabli...
    Rule Medium Severity
  • SRG-APP-000320

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to notify system administrators (SAs) and information system security officer (ISSO) of account enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestabli...
    Rule Medium Severity
  • SRG-APP-000345

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to maintain locks on user accounts until released by an administrator.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-APP-000358

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to send audit records to a centralized audit server.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-APP-000374

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to use or map to Coordinated Universal Time (UTC) to record time stamps for audit records.

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Medium Severity
  • AAA Services used for 802.1x must be configured to authenticate network endpoint devices (supplicants) before the authenticator establishes any connection.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to use at least two NTP servers to synchronize time.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Low Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to authenticate all NTP messages received from NTP servers and peers.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to use their loopback or OOB management interface address as the source address when originating NTP traffic.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Low Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • AAA Services used for 802.1x must be configured to use secure Extensible Authentication Protocol (EAP), such as EAP-TLS, EAP-TTLS, and PEAP.

    &lt;VulnDiscussion&gt;Additional new EAP methods/types are still being proposed. However, the three being considered secure are EAP-TLS, EAP-TTLS, ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must not be configured with shared accounts.

    &lt;VulnDiscussion&gt;Shared accounts configured for use on a network device do not allow for accountability or repudiation of individuals using th...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • AAA Services used to authenticate privileged users for device management must be configured to connect to the management network.

    &lt;VulnDiscussion&gt;Using standardized authentication protocols such as RADIUS, TACACS+, and Kerberos, an authentication server provides centrali...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to use a unique shared secret for communication (i.e. RADIUS, TACACS+) with clients requesting authentication services.

    &lt;VulnDiscussion&gt;Using standardized authentication protocols such as RADIUS, TACACS+, and Kerberos, an authentication server provides centrali...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to use IP segments separate from production VLAN IP segments.

    &lt;VulnDiscussion&gt;When policy assessment and remediation have been implemented and the advanced AAA server dynamic VLAN is misconfigured, logic...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to place non-authenticated network access requests in the Unauthorized VLAN or the Guest VLAN with limited access.

    &lt;VulnDiscussion&gt;Devices having an IP address that do not pass authentication can be used to attack compliant devices if they share VLANs. Whe...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuring the application to implement organization-wide security implementation guides and security checklists ensures com...
    Rule Medium Severity
  • SRG-APP-000700

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to disable accounts when the accounts have expired.

    &lt;VulnDiscussion&gt;Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...
    Rule Medium Severity
  • SRG-APP-000705

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to disable accounts when the accounts are no longer associated to a user.

    &lt;VulnDiscussion&gt;Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...
    Rule Medium Severity
  • SRG-APP-000710

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to disable accounts when the accounts are in violation of organizational policy.

    &lt;VulnDiscussion&gt;Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...
    Rule Medium Severity
  • SRG-APP-000805

    <GroupDescription></GroupDescription>
    Group
  • AAA Services must be configured to automatically generate audit records of the enforcement actions.

    &lt;VulnDiscussion&gt;Organizations log system accesses associated with applying configuration changes to ensure that configuration change control ...
    Rule Medium Severity
  • SRG-APP-000815

    <GroupDescription></GroupDescription>
    Group
  • For password-based authentication, AAA Services must be configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multi-factor authe...
    Rule Medium Severity
  • SRG-APP-000845

    <GroupDescription></GroupDescription>
    Group
  • For password-based authentication, AAA Services must be configured to verify when users create or update passwords, and that the passwords are not on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multi-factor authe...
    Rule Medium Severity
  • SRG-APP-000855

    <GroupDescription></GroupDescription>
    Group
  • For password-based authentication, AAA Services must be configured to require immediate selection of a new password upon account recovery.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multi-factor authe...
    Rule Medium Severity
  • SRG-APP-000860

    <GroupDescription></GroupDescription>
    Group
  • For password-based authentication, AAA Services must be configured to allow user selection of long passwords and passphrases, including spaces and all printable characters.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multi-factor authe...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules