Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000334-NAC-001350

    <GroupDescription></GroupDescription>
    Group
  • Forescout must off-load log records onto a different system. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Having a separate, secure location for log records is essential to the preservation of logs as required by policy.&lt;/VulnDi...
    Rule Medium Severity
  • SRG-NET-000335-NAC-001360

    <GroupDescription></GroupDescription>
    Group
  • Forescout must generate a critical alert to be sent to the Information System Security Officer (ISSO) and Systems Administrator (SA) (at a minimum) in the event of an audit processing failure. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Ensuring that a security solution alerts in the event of misconfiguration or error is imperative to ensuring that proper audi...
    Rule Medium Severity
  • SRG-NET-000343-NAC-001460

    <GroupDescription></GroupDescription>
    Group
  • Forescout must authenticate all endpoint devices before establishing a connection and proceeding with posture assessment. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Authenticating all devices as they connect to the network is the baseline of a good security solution. This is especially imp...
    Rule Medium Severity
  • SRG-NET-000343-NAC-001470

    <GroupDescription></GroupDescription>
    Group
  • Forescout must be configured to apply dynamic ACLs that restrict the use of ports when non-entity endpoints are connected using MAC Authentication Bypass (MAB). This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;MAB is only one way of connecting non-entity endpoints, and can be defeated by spoofing the MAC address of an assumed authori...
    Rule Medium Severity
  • SRG-NET-000273-NAC-000970

    <GroupDescription></GroupDescription>
    Group
  • Forescout must reveal error messages only to the Information System Security Officer (ISSO), Information System Security Manager (ISSM), and System Administrator (SA). This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Ensuring the proper amount of information is provided to the Security Management staff is imperative to ensure role based acc...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules