Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • MFD/Printer Firewall/Router Rule Perimeter

    Group
  • A firewall or router rule must block all ingress and egress traffic from the enclave perimeter to the MFD or Network Printer.

    Access to the MFD or printer from outside the enclave network could lead to a denial of service caused by a large number of large print files being sent to the device. Ability for the MFD or printe...
    Rule Medium Severity
  • MFD Firmware

    Group
  • The MFD or Network Printer must employ the most current firmware available.

    MFD devices or printers utilizing old firmware can expose the network to known vulnerabilities leading to a denial of service or a compromise of sensitive data. While the MFD must use the most curr...
    Rule Medium Severity
  • MFD SNMP Community Strings

    Group
  • The default passwords and SNMP community strings of all management services have not been replaced with complex passwords.

    There are many known vulnerabilities in the SNMP protocol and if the default community strings and passwords are not modified an unauthorized individual could gain control of the MFD or printer. T...
    Rule High Severity
  • MFD Configuration State After Power Down or Reboot

    Group
  • The MFD or Network Printer must maintain configuration state (e.g., passwords, service settings) after a power down or restart.

    If the MFD does not maintain it state over a power down or restart, it will expose the network to all of the vulnerabilities that where mitigated by the modifications made to its configuration stat...
    Rule High Severity
  • MFD Management Protocols

    Group
  • Management protocols, with the exception of HTTPS and SNMPv3, must be disabled at all times except when necessary.

    Unneeded protocols expose the device and the network to unnecessary vulnerabilities.
    Rule Medium Severity
  • MFD or a printer can be managed from any IP

    Group
  • There is no restriction on where a MFD or a printer can be remotely managed.

    Since unrestricted access to the MFD or printer for management is not required the restricting the management interface to specific IP addresses decreases the exposure of the system to malicious ac...
    Rule High Severity
  • Print Services Restricted to Port 9100 and/or LPD

    Group
  • Print services for a MFD or printer are not restricted to Port 9100 and/or LPD (Port 515). Where both Windows and non-Windows clients need services from the same device, both Port 9100 and LPD can be enabled simultaneously.

    Printer services running on ports other than the known ports for printing cannot be monitored on the network and could lead to a denial of service it the invalid port is blocked by a network admini...
    Rule Low Severity
  • MFD/Printer Restrict Jobs Only From Print Spooler

    Group
  • A MFD or printer is not configured to restrict jobs to those from print spoolers.

    If MFDs or printers are not restricted to accept print jobs only from print spoolers that authenticate the user and log the job, a denial of service can be created by the MFD or printer accepting o...
    Rule Medium Severity
  • MFD Authorized Users Restrictions

    Group
  • Print spoolers are not configured to restrict access to authorized users and restrict users to managing their own individual jobs.

    If unauthorized users are allowed access to the print spooler they can queue large print file creating a denial of service for other users. If users are not restricted to manipulating only files t...
    Rule Medium Severity
  • MFD and Spooler Auditing

    Group
  • The devices and their spoolers do not have auditing enabled.

    Without auditing the identification and prosecution of an individual that performs malicious actions is difficult if not impossible.
    Rule Medium Severity
  • MFD/Printer Security Policy

    Group
  • Implementation of an MFD and printer security policy for the protection of classified information.

    Department of Defense Manual 5200.01, "Protection of Classified Information" provides policy, assigns responsibilities, and provides procedures for the designation, marking, protection, and dissemi...
    Rule Low Severity
  • MFD Level of Audit and Reviewing

    Group
  • The level of audit has not been established or the audit logs being collected for the devices and print spoolers are not being reviewed.

    If inadequate information is captured in the audit, the identification and prosecution of malicious user will be very difficult. If the audits are not regularly reviewed suspicious activity may go ...
    Rule Low Severity
  • MFD Classified Network

    Group
  • MFDs with print, copy, scan, or fax capabilities must be prohibited on classified networks without the approval of the DAA.

    MFDs with print, copy, scan, or fax capabilities, if compromised, could lead to the compromise of classified data or the compromise of the network. The IAO will ensure MFDs with copy, scan, or fax...
    Rule High Severity
  • MFD Clearing Disk Space Scan to Disk

    Group
  • A MFD device, with scan to hard disk functionality used, is not configured to clear the hard disk between jobs.

    If the MFD is compromised the un-cleared, previously used, space on the hard disk drive can be read which can lead to a compromise of sensitive data. The SA will ensure the device is configured to ...
    Rule Medium Severity
  • MFD Scan Discretionary Access Control

    Group
  • Scan to a file share is enabled but the file shares do not have the appropriate discretionary access control list in place.

    Without appropriate discretionary access controls unauthorized individuals may read the scanned data. This can lead to a compromise of sensitive data. The SA will ensure file shares have the appro...
    Rule Low Severity
  • MFD fax from network auditing

    Group
  • Auditing of user access and fax logs must be enabled when fax from the network is enabled.

    Without auditing the originator and destination of a fax cannot be determined. Prosecuting of an individual who maliciously compromises sensitive data via a fax will be hindered without audits. Th...
    Rule Low Severity
  • MFD scan to SMTP (email)

    Group
  • MFDs must not allow scan to SMTP (email).

    The SMTP engines found on the MFDs reviewed when writing the MFD STIG did not have robust enough security features supporting scan to email. Because of the lack of robust security, scan to email wi...
    Rule Medium Severity
  • MFD Hard Drive Lock

    Group
  • A MFD device does not have a mechanism to lock and prevent access to the hard drive.

    If the hard disk drive of a MFD can be removed from the MFD the data on the drive can be recovered and read. This can lead to a compromise of sensitive data. The IAO will ensure the device has a ...
    Rule Medium Severity
  • MFD/Printer Global Configuration Settings

    Group
  • The device is not configured to prevent non-printer administrators from altering the global configuration of the device.

    If unauthorized users can alter the global configuration of the MFD they can remove all security. This can lead to the compromise of sensitive data or the compromise of the network the MFD is atta...
    Rule High Severity
  • MFD03.002

    Group
  • The MFD must be configured to prohibit the use of all unnecessary and/or nonsecure functions, physical and logical ports, protocols, and/or services.

    In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable...
    Rule Medium Severity
  • MFD Protocol TCP/IP

    Group
  • The MFD or Network Printer must not enable network protocols other than TCP/IP.

    The greater the number of protocols allowed active on the network the more vulnerabilities there will be available to be exploited. This also prevents accidental implementation of a “call-home” fea...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules