I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000038-NDM-000213
Group -
The Cisco router must be configured to enforce approved authorizations for controlling the flow of management information within the device based on control policies.
A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design. If management information flow is not enforced based on approved autho...Rule Medium Severity -
SRG-APP-000065-NDM-000214
Group -
The Cisco router must be configured to enforce the limit of three consecutive invalid logon attempts after which time lock out the user account from accessing the device for 15 minutes.
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.Rule Medium Severity -
SRG-APP-000068-NDM-000215
Group -
The Cisco router must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executi...Rule Medium Severity -
SRG-APP-000091-NDM-000223
Group -
The Cisco router must be configured to generate audit records when successful/unsuccessful attempts to logon with access privileges occur.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-APP-000096-NDM-000226
Group -
The Cisco router must produce audit records containing information to establish when (date and time) the events occurred.
It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done in order to compile an accurate risk assessment. ...Rule Medium Severity -
SRG-APP-000097-NDM-000227
Group -
The Cisco router must produce audit records containing information to establish where the events occurred.
In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as device hardware components, device softw...Rule Medium Severity -
SRG-APP-000142-NDM-000245
Group -
The Cisco router must be configured to be configured to prohibit the use of all unnecessary and nonsecure functions and services.
Network devices are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational op...Rule High Severity -
SRG-APP-000148-NDM-000346
Group -
The Cisco router must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.
Authentication for administrative (privileged level) access to the device is required at all times. An account can be created on the device's local database for use when the authentication server i...Rule Medium Severity -
SRG-APP-000156-NDM-000250
Group -
The Cisco router must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.
A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...Rule Medium Severity -
SRG-APP-000190-NDM-000267
Group -
The Cisco router must be configured to terminate all network connections associated with device management after five minutes of inactivity.
Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.