Skip to content

HPE Nimble Storage Array NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000170-NDM-000329

    Group
  • The HPE Nimble must forward critical alerts (at a minimum) to the system administrators and the ISSO.

    Alerts are essential to let the system administrators and security personnel know immediately of issues which may impact the system or users. If these alerts are also sent to the syslog, this infor...
    Rule High Severity
  • SRG-APP-000516-NDM-000351

    Group
  • SRG-APP-000190-NDM-000267

    Group
  • The HPE Nimble must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule High Severity
  • SRG-APP-000516-NDM-000336

    Group
  • The HPE Nimble must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.

    Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With ro...
    Rule High Severity
  • SRG-APP-000516-NDM-000344

    Group
  • The HPE Nimble must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

    For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000350

    Group
  • The HPE Nimble must be running an operating system release that is currently supported by the vendor.

    Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities.
    Rule High Severity
  • SRG-APP-000001-NDM-000200

    Group
  • SRG-APP-000373-NDM-000298

    Group
  • The HPE Nimble must be configured to synchronize internal information system clocks using an authoritative time source.

    The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other ...
    Rule Medium Severity
  • SRG-APP-000515-NDM-000325

    Group
  • The HPE Nimble must configure a syslog server onto a different system or media than the system being audited.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. UDP is used to communicate between the array group and the syslog server (SSL is not supported ...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    Group
  • SRG-APP-000142-NDM-000245

    Group
  • HPE Nimble must not be configured to use "HPE Greenlake: Data Services Cloud Console".

    DOD requires that the Mission Owner uses only the cloud services offering listed in either the FedRAMP or DISA PA DOD Cloud Catalog to host Unclassified, public-releasable, DOD information. Managem...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules