Trend Micro TippingPoint NDM Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000395-NDM-000310
Group -
The TippingPoint SMS must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...Rule High Severity -
SRG-APP-000395-NDM-000347
Group -
The TippingPoint SMS must authenticate Network Time Protocol sources using authentication that is cryptographically based.
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...Rule High Severity -
SRG-APP-000411-NDM-000330
Group -
The TippingPoint TPS must have FIPS mode enforced.
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be ...Rule High Severity -
SRG-APP-000435-NDM-000315
Group -
SRG-APP-000503-NDM-000320
Group -
The TippingPoint SMS must generate audit records when successful/unsuccessful logon attempts occur.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Low Severity -
SRG-APP-000516-NDM-000336
Group -
SRG-APP-000516-NDM-000340
Group -
The TippingPoint SMS must be configured to conduct backups of system level information contained in the information system when changes occur.
System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execu...Rule Medium Severity -
SRG-APP-000516-NDM-000341
Group -
SRG-APP-000516-NDM-000344
Group -
The TippingPoint SMS must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure...Rule Medium Severity -
SRG-APP-000516-NDM-000351
Group -
The TippingPoint SMS must be running an operating system release that is currently supported by the vendor.
Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities.Rule Medium Severity -
SRG-APP-000026-NDM-000208
Group -
SRG-APP-000317-NDM-000282
Group -
The password for the local account of last resort and the device password (if configured) must be changed when members who had access to the password leave the role and are no longer authorized access.
If shared/group account credentials are not terminated when individuals leave the group, the user that left the group can still gain access even though they are no longer authorized. There may also...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.