Skip to content

Trend Micro TippingPoint NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000395-NDM-000310

    Group
  • The TippingPoint SMS must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).

    Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...
    Rule High Severity
  • SRG-APP-000395-NDM-000347

    Group
  • The TippingPoint SMS must authenticate Network Time Protocol sources using authentication that is cryptographically based.

    Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...
    Rule High Severity
  • SRG-APP-000411-NDM-000330

    Group
  • The TippingPoint TPS must have FIPS mode enforced.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be ...
    Rule High Severity
  • SRG-APP-000435-NDM-000315

    Group
  • SRG-APP-000503-NDM-000320

    Group
  • The TippingPoint SMS must generate audit records when successful/unsuccessful logon attempts occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Low Severity
  • SRG-APP-000516-NDM-000336

    Group
  • SRG-APP-000516-NDM-000340

    Group
  • The TippingPoint SMS must be configured to conduct backups of system level information contained in the information system when changes occur.

    System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execu...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000341

    Group
  • SRG-APP-000516-NDM-000344

    Group
  • The TippingPoint SMS must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

    For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000351

    Group
  • The TippingPoint SMS must be running an operating system release that is currently supported by the vendor.

    Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities.
    Rule Medium Severity
  • SRG-APP-000026-NDM-000208

    Group
  • SRG-APP-000317-NDM-000282

    Group
  • The password for the local account of last resort and the device password (if configured) must be changed when members who had access to the password leave the role and are no longer authorized access.

    If shared/group account credentials are not terminated when individuals leave the group, the user that left the group can still gain access even though they are no longer authorized. There may also...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules