Skip to content

Network Infrastructure Policy Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • NET-IDPS-031

    <GroupDescription></GroupDescription>
    Group
  • The Intrusion Detection and Prevention System (IDPS) configuration must be backed up before applying software or signature updates, or when making changes to the configuration.

    &lt;VulnDiscussion&gt;There are two types of IDPS updates: software updates and signature updates. Software updates fix bugs in the IDPS software o...
    Rule Low Severity
  • NET-IDPS-032

    <GroupDescription></GroupDescription>
    Group
  • The Intrusion Detection and Prevention System (IDPS) file checksums provided by the vendor must be compared and verified with checksums computed from CD or downloaded files.

    &lt;VulnDiscussion&gt;There are two types of IDPS updates: software updates and signature updates. Software updates fix bugs in the IDPS software o...
    Rule Low Severity
  • NET-IDPS-033

    <GroupDescription></GroupDescription>
    Group
  • The organization must establish weekly data backup procedures for the network Intrusion Detection and Prevention System (IDPS) data.

    &lt;VulnDiscussion&gt;IDPS data needs to be backed up to ensure preservation in the case a loss of data due to hardware failure or malicious activi...
    Rule Medium Severity
  • NET-IDPS-035

    <GroupDescription></GroupDescription>
    Group
  • The Intrusion Detection and Prevention System (IDPS) software and signatures must be updated when updates are provided by the vendor.

    &lt;VulnDiscussion&gt;Keeping the IDPS software updated with the latest engine and attack signatures will allow for the IDPS to detect all forms of...
    Rule Low Severity
  • NET-TUNL-026

    <GroupDescription></GroupDescription>
    Group
  • Encapsulated and/or encrypted traffic received from another enclave must not bypass the network perimeter defense without being terminated and inspected before entering the enclaves private network.

    &lt;VulnDiscussion&gt;Allowing encapsulated traffic to bypass the enclave's network perimeter without being filtered and inspected leaves the encla...
    Rule High Severity
  • NET-TUNL-028

    <GroupDescription></GroupDescription>
    Group
  • Tunneling of classified traffic across an unclassified IP transport network or service provider backbone must be documented in the enclaves security authorization package and an Approval to Connect (ATC), or an Interim ATC must be issued by DISA prior to implementation.

    &lt;VulnDiscussion&gt;CJCSI 6211.02D instruction establishes policy and responsibilities for the connection of any information systems to the Defen...
    Rule High Severity
  • NET-TUNL-030

    <GroupDescription></GroupDescription>
    Group
  • DSAWG approval must be obtained before tunneling classified traffic outside the components local area network boundaries across a non-DISN or OCONUS DISN unclassified IP wide area network transport infrastructure.

    &lt;VulnDiscussion&gt;CJCSI 6211.02D instruction establishes policy and responsibilities for the connection of any information systems to the Defen...
    Rule High Severity
  • NET-TUNL-031

    <GroupDescription></GroupDescription>
    Group
  • Tunneling of classified traffic across an unclassified IP transport network must employ cryptographic algorithms in accordance with CNSS Policy No. 15.

    &lt;VulnDiscussion&gt;When transporting classified data over an unclassified IP network, it is imperative that traffic from the classified enclave ...
    Rule High Severity
  • NET-VLAN-001

    <GroupDescription></GroupDescription>
    Group
  • The organization must ensure all switches and associated cross-connect hardware are kept in a secure Intermediate Distribution Frame (IDF) or an enclosed cabinet that is kept locked.

    &lt;VulnDiscussion&gt;Since the IDF includes all hardware required to connect horizontal wiring to the backbone, it is imperative that all switches...
    Rule Medium Severity
  • NET0090

    <GroupDescription></GroupDescription>
    Group
  • Network topology diagrams for the enclave must be maintained and up to date at all times.

    &lt;VulnDiscussion&gt;To assist in the management, auditing, and security of the network infrastructure facility drawings and topology maps are a n...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules