Skip to content

Cisco ASA NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Cisco ASA must be configured to produce audit records that contain information to establish the outcome of the event.

    Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the sy...
    Rule Medium Severity
  • SRG-APP-000101-NDM-000231

    Group
  • SRG-APP-000142-NDM-000245

    Group
  • The Cisco ASA must be configured to prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services.

    In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable...
    Rule High Severity
  • SRG-APP-000148-NDM-000346

    Group
  • SRG-APP-000156-NDM-000250

    Group
  • The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.

    A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...
    Rule Medium Severity
  • SRG-APP-000164-NDM-000252

    Group
  • The Cisco ASA must be configured to enforce a minimum 15-character password length.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to d...
    Rule Medium Severity
  • SRG-APP-000166-NDM-000254

    Group
  • The Cisco ASA must be configured to enforce password complexity by requiring that at least one uppercase character be used.

    Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisti...
    Rule Medium Severity
  • SRG-APP-000167-NDM-000255

    Group
  • SRG-APP-000375-NDM-000300

    Group
  • SRG-APP-000168-NDM-000256

    Group
  • SRG-APP-000169-NDM-000257

    Group
  • The Cisco ASA must be configured to enforce password complexity by requiring that at least one special character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000170-NDM-000329

    Group
  • SRG-APP-000190-NDM-000267

    Group
  • The Cisco ASA must be configured to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.

    Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records. Time stamps generated by the application include date and time. Granula...
    Rule Medium Severity
  • SRG-APP-000343-NDM-000289

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules