Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000003-NDM-000202

    Group
  • The HYCU 4.1 application and server must initiate a session lock after a 15-minute period of inactivity.

    A session lock is a temporary network device or administrator-initiated action taken when the administrator stops work but does not log out of the network device. Rather than relying on the user to...
    Rule Medium Severity
  • SRG-APP-000317-NDM-000282

    Group
  • The HYCU server must terminate shared/group account credentials when members leave the group.

    A shared/group account credential is a shared form of authentication that allows multiple individuals to access the network device using a single account. If shared/group account credentials are no...
    Rule Medium Severity
  • SRG-APP-000033-NDM-000212

    Group
  • The HYCU 4.1 Application must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems must be properly configured to incorporate ...
    Rule High Severity
  • SRG-APP-000328-NDM-000286

    Group
  • If the HYCU Server or Web UI uses discretionary access control, the network device must enforce organization-defined discretionary access control policies over defined subjects and objects.

    Discretionary Access Control (DAC) is based on the notion that individual network administrators are "owners" of objects and therefore have discretion over who should be authorized to access the ob...
    Rule Medium Severity
  • SRG-APP-000038-NDM-000213

    Group
  • The HYCU virtual machine must enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.

    A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design. If management information flow is not enforced based on approved autho...
    Rule Medium Severity
  • SRG-APP-000343-NDM-000289

    Group
  • The HYCU server and Web UI must audit the execution of privileged functions.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Medium Severity
  • SRG-APP-000065-NDM-000214

    Group
  • The HYCU VM console must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any logon attempt for 15 minutes.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    Group
  • The HYCU VM console must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.

    Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executi...
    Rule Medium Severity
  • SRG-APP-000069-NDM-000216

    Group
  • The HYCU VM console must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.

    The banner must be acknowledged by the administrator prior to the device allowing the administrator access to the network device. This provides assurance that the administrator has seen the message...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    Group
  • The HYCU VM/server must be configured to disable SSH.

    It is detrimental for applications to provide functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and therefore may remain un...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules