Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000164-NDM-000252

    Group
  • The Arista Multilayer Switch account of last resort must have a password with a length of 15 characters.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000026-NDM-000208

    Group
  • The Arista Multilayer Switch must automatically audit account creation.

    Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. Notifica...
    Rule Medium Severity
  • SRG-APP-000027-NDM-000209

    Group
  • The Arista Multilayer Switch must automatically audit account modification.

    Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security of the network device. Account management by a designated authority ens...
    Rule Medium Severity
  • SRG-APP-000028-NDM-000210

    Group
  • The Arista Multilayer Switch must automatically audit account disabling actions.

    Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account disabling actions will ...
    Rule Medium Severity
  • SRG-APP-000029-NDM-000211

    Group
  • The Arista Multilayer Switch must automatically audit account removal actions.

    Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will su...
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    Group
  • The Arista Multilayer Switch must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.

    Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executi...
    Rule Medium Severity
  • SRG-APP-000080-NDM-000220

    Group
  • The Arista Multilayer Switch must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.

    This requirement supports non-repudiation of actions taken by an administrator and is required in order to maintain the integrity of the configuration management process. All configuration changes ...
    Rule Low Severity
  • SRG-APP-000091-NDM-000223

    Group
  • The Arista Multilayer Switch must generate audit records when successful/unsuccessful attempts to access privileges occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Low Severity
  • SRG-APP-000095-NDM-000225

    Group
  • The Arista Multilayer Switch must produce audit log records containing sufficient information to establish what type of event occurred.

    It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done in order to compile an accurate risk assessment. ...
    Rule Low Severity
  • SRG-APP-000101-NDM-000231

    Group
  • The Arista Multilayer Switch must generate audit records containing the full-text recording of privileged commands.

    Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Organizations consider limiting the additional audit information to only ...
    Rule Low Severity
  • SRG-APP-000142-NDM-000245

    Group
  • The Arista Multilayer Switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable...
    Rule Medium Severity
  • SRG-APP-000151-NDM-000248

    Group
  • The Arista Multilayer Switch must use multifactor authentication for local access to privileged accounts.

    Multifactor authentication is defined as: using two or more factors to achieve authentication. Factors include: (i) Something a user knows (e.g., password/PIN); (ii) Something a user has (e.g., ...
    Rule Medium Severity
  • SRG-APP-000190-NDM-000267

    Group
  • The Arista Multilayer Switch must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity
  • SRG-APP-000267-NDM-000273

    Group
  • The Arista Multilayer Switch must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state. Additionally, sensitive account informatio...
    Rule Medium Severity
  • SRG-APP-000268-NDM-000274

    Group
  • The Arista Multilayer Switch must activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.

    Predictable failure prevention requires organizational planning to address device failure issues. If components key to maintaining the device's security fail to function, the device could continue ...
    Rule Medium Severity
  • SRG-APP-000372-NDM-000297

    Group
  • The Arista Multilayer Switch must synchronize internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period.

    Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when condu...
    Rule Medium Severity
  • SRG-APP-000373-NDM-000298

    Group
  • The Arista Multilayer Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.

    The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other ...
    Rule Medium Severity
  • SRG-APP-000374-NDM-000299

    Group
  • The Arista Multilayer Switch must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Tim...
    Rule Medium Severity
  • SRG-APP-000411-NDM-000330

    Group
  • Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.

    This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP.
    Rule Medium Severity
  • SRG-APP-000412-NDM-000331

    Group
  • Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.

    This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP.
    Rule Medium Severity
  • SRG-APP-000504-NDM-000321

    Group
  • The Arista Multilayer Switch must generate audit records for privileged activities or other system-level access.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-APP-000505-NDM-000322

    Group
  • The Arista Multilayer Switch must generate audit records showing starting and ending time for administrator access to the system.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-APP-000506-NDM-000323

    Group
  • The Arista Multilayer Switch must generate audit records when concurrent logons from different workstations occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-APP-000509-NDM-000324

    Group
  • The Arista Multilayer Switch must generate audit records for all account creations, modifications, disabling, and termination events.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-APP-000515-NDM-000325

    Group
  • The Arista Multilayer Switch must, at a minimum, off-load audit records for interconnected systems in real time.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules