Forescout Network Device Management Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000516-NDM-000334
<GroupDescription></GroupDescription>Group -
Forescout must generate log records for a locally developed list of auditable events.
<VulnDiscussion>Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means...Rule Medium Severity -
SRG-APP-000516-NDM-000340
<GroupDescription></GroupDescription>Group -
Forescout must be configured to conduct backups of system-level information contained in the information system when changes occur.
<VulnDiscussion>System-level information includes default and customized settings and security attributes, including ACLs that relate to the ...Rule Medium Severity -
SRG-APP-000516-NDM-000341
<GroupDescription></GroupDescription>Group -
Forescout must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
<VulnDiscussion>System-level information includes default and customized settings and security attributes, including ACLs that relate to the ...Rule Medium Severity -
SRG-APP-000516-NDM-000344
<GroupDescription></GroupDescription>Group -
Forescout must use DOD-approved PKI rather than proprietary or self-signed device certificates.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-ap...Rule High Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
Forescout must disable the Request Customer Verification setting.
<VulnDiscussion>To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...Rule Low Severity -
SRG-APP-000395-NDM-000310
<GroupDescription></GroupDescription>Group -
Forescout must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...Rule High Severity -
SRG-APP-000395-NDM-000347
<GroupDescription></GroupDescription>Group -
Before establishing a connection with a Network Time Protocol (NTP) server, Forescout must authenticate using a bidirectional, cryptographically based authentication method that uses a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the NTP server.
<VulnDiscussion>If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be us...Rule Medium Severity -
SRG-APP-000166-NDM-000254
<GroupDescription></GroupDescription>Group -
Forescout must enforce password complexity by requiring that at least one uppercase character be used.
<VulnDiscussion>Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...Rule Medium Severity -
SRG-APP-000167-NDM-000255
<GroupDescription></GroupDescription>Group -
Forescout must enforce password complexity by requiring that at least one lowercase character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000164-NDM-000252
<GroupDescription></GroupDescription>Group -
Forescout must enforce a minimum 15-character password length.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-APP-000168-NDM-000256
<GroupDescription></GroupDescription>Group -
Forescout must enforce password complexity by requiring that at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000169-NDM-000257
<GroupDescription></GroupDescription>Group -
Forescout must enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000170-NDM-000329
<GroupDescription></GroupDescription>Group -
Forescout must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the Information System Security Officer (ISSO).
<VulnDiscussion>The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate sec...Rule High Severity -
Forescout must require that when a password is changed, the characters are changed in at least eight of the positions within the password.
<VulnDiscussion>If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...Rule Low Severity -
SRG-APP-000179-NDM-000265
<GroupDescription></GroupDescription>Group -
Forescout must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
<VulnDiscussion>Unapproved mechanisms used for authentication to the cryptographic module are not validated and therefore cannot be relied up...Rule High Severity -
SRG-APP-000190-NDM-000267
<GroupDescription></GroupDescription>Group -
Forescout must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule High Severity -
SRG-APP-000231-NDM-000271
<GroupDescription></GroupDescription>Group -
Forescout must only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).
<VulnDiscussion>This requirement addresses the confidentiality and integrity of system information at rest (e.g., network device rule sets) w...Rule High Severity -
SRG-APP-000516-NDM-000350
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.