Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000138-ALG-000089

    Group
  • If user authentication services are provided, CounterACT must restrict user authentication traffic to specific authentication server(s).

    User authentication can be used as part of the policy filtering rule sets. Some URLs or network resources can be restricted to authenticated users only. Users are prompted by the application or bro...
    Rule Medium Severity
  • SRG-NET-000147-ALG-000095

    Group
  • CounterACT, when providing user authentication intermediary services, must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.

    A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...
    Rule Medium Severity
  • SRG-NET-000334-ALG-000050

    Group
  • CounterACT must off-load audit records onto a centralized log server.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. Th...
    Rule Medium Severity
  • SRG-NET-000337-ALG-000096

    Group
  • CounterACT, when providing user authentication intermediary services, must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    Without reauthentication, users may access resources or perform tasks for which they do not have authorization. In addition to the reauthentication requirements associated with session locks, orga...
    Rule Medium Severity
  • SRG-NET-000339-ALG-000090

    Group
  • CounterACT, when providing user authentication intermediary services, must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.

    For remote access to non-privileged accounts, the purpose of requiring a device that is separate from the information system gaining access for one of the factors during multifactor authentication ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules