Skip to content

Network Device Management Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000865

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to employ automated tools to assist the user in selecting strong password authenticators for password-based authentication.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-APP-000875

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to implement a local cache of revocation data to support path discovery and validation for public key-based authentication.

    &lt;VulnDiscussion&gt;Public key cryptography is a valid authentication mechanism for individuals, machines, and devices. For PKI solutions, status...
    Rule Medium Severity
  • SRG-APP-000880

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.

    &lt;VulnDiscussion&gt;Nonlocal maintenance and diagnostic activities are conducted by individuals who communicate through either an external or int...
    Rule Medium Severity
  • SRG-APP-000910

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to include only approved trust anchors in trust stores or certificate stores managed by the organization.

    &lt;VulnDiscussion&gt;Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certific...
    Rule Medium Severity
  • SRG-APP-000915

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.

    &lt;VulnDiscussion&gt;A Trusted Platform Module (TPM) is an example of a hardware-protected data store that can be used to protect cryptographic ke...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules