Traditional Security Checklist
Rules, Groups, and Values defined within the XCCDF Benchmark
-
IA-10.03.01
<GroupDescription></GroupDescription>Group -
Information Assurance - Authorizing Official (AO) and DoDIN Connection Approval Office (CAO) Approval Documentation for use of KVM and A/B switches for Sharing of Classified and Unclassified Peripheral Devices
<VulnDiscussion>Failure to request approval for connection of existing or additional KVM or A/B devices (switch boxes) for use in switching b...Rule Low Severity -
IA-11.01.01
<GroupDescription></GroupDescription>Group -
Information Assurance - Unauthorized Wireless Devices - Portable Electronic Devices (PEDs) Used in Classified Processing Areas without Certified TEMPEST Technical Authority (CTTA) Review and Authorizing Official (AO) Approval.
<VulnDiscussion>Allowing wireless devices in the vicinity of classified processing or discussion could directly result in the loss or comprom...Rule Medium Severity -
IA-11.03.01
<GroupDescription></GroupDescription>Group -
Information Assurance - Unauthorized Wireless Devices - No Formal Policy and/or Warning Signs
<VulnDiscussion>Not having a wireless policy and/or warning signs at entrances could result in the unauthorized introduction of wireless devi...Rule Low Severity -
IA-12.01.01
<GroupDescription></GroupDescription>Group -
Information Assurance - Network Connections - Physical Protection of Network Devices such as Routers, Switches and Hubs (Connected to SIPRNet or Other Classified Networks or Systems Being Inspected)
<VulnDiscussion>SIPRNet or other classified network connections that are not properly protected in their physical environment are highly vuln...Rule High Severity -
IA-12.01.02
<GroupDescription></GroupDescription>Group -
Information Assurance - Network Connections - Wall Jack Security on Classified Networks (SIPRNet or other Inspected Classified Network or System) Where Port Authentication Using IEEE 802.1X IS NOT Implemented
<VulnDiscussion>Following is a summary of the primary requirement to use the IEEE 802.1X authentication protocol to secure SIPRNet ports (AKA...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.