Skip to content

Trend Micro TippingPoint NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000395-NDM-000310

    Group
  • The TippingPoint SMS must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).

    Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...
    Rule High Severity
  • SRG-APP-000395-NDM-000347

    Group
  • The TippingPoint SMS must authenticate Network Time Protocol sources using authentication that is cryptographically based.

    Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...
    Rule High Severity
  • SRG-APP-000411-NDM-000330

    Group
  • The TippingPoint TPS must have FIPS mode enforced.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be ...
    Rule High Severity
  • SRG-APP-000435-NDM-000315

    Group
  • SRG-APP-000503-NDM-000320

    Group
  • The TippingPoint SMS must generate audit records when successful/unsuccessful logon attempts occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Low Severity
  • SRG-APP-000516-NDM-000336

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules