Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-NDM-000336

    Group
  • The NSX-T Manager must integrate with either VMware Identity Manager (vIDM) or VMware Workspace ONE Access.

    Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With ro...
    Rule High Severity
  • SRG-APP-000516-NDM-000340

    Group
  • The NSX-T Manager must be configured to conduct backups on an organizationally defined schedule.

    System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execu...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000341

    Group
  • The NSX-T Manager must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.

    Information system backup is a critical step in maintaining data assurance and availability. Information system and security-related documentation contains information pertaining to system configur...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    Group
  • The NSX-T Manager must obtain its public key certificates from an approved DoD certificate authority.

    For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For Federal agencies operating a legacy public key infrastructure...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000350

    Group
  • The NSX-T Manager must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the Information System Security Officer (ISSO).

    The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate security personnel. The stored log data can used to detect weaknesses in se...
    Rule High Severity
  • SRG-APP-000516-NDM-000351

    Group
  • The NSX-T Manager must be running a release that is currently supported by the vendor.

    Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities.
    Rule High Severity
  • SRG-APP-000142-NDM-000245

    Group
  • The NSX-T Manager must not provide environment information to third parties.

    Providing technical details about an environment's infrastructure to third parties could unknowingly expose sensitive information to bad actors if intercepted.
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    Group
  • The NSX-T Manager must disable SSH.

    The NSX-T shell provides temporary access to commands essential for server maintenance. Intended primarily for use in break-fix scenarios, the NSX-T shell is well suited for checking and modifying ...
    Rule Low Severity
  • SRG-APP-000142-NDM-000245

    Group
  • The NSX-T Manager must disable unused local accounts.

    Prior to NSX-T 3.1 and earlier, there are three local accounts: root, admin, and audit. These local accounts could not be disabled and no additional accounts could be created. Starting in NSX-T 3.1...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    Group
  • The NSX-T Manager must disable TLS 1.1 and enable TLS 1.2.

    TLS 1.0 and 1.1 are deprecated protocols with well-published shortcomings and vulnerabilities. TLS 1.2 must be enabled on all interfaces and TLS 1.1 and 1.0 disabled where supported.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules