Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000166-NDM-000254

    Group
  • The ICS must be configured to enforce password complexity by requiring that at least one uppercase character be used.

    Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisti...
    Rule Medium Severity
  • SRG-APP-000175-NDM-000262

    Group
  • The ICS must be configured to use DOD approved OCSP responders or CRLs to validate certificates used for PKI-based authentication.

    Once issued by a DOD certificate authority (CA), public key infrastructure (PKI) certificates are typically valid for three years or shorter within the DOD. However, there are many reasons a certif...
    Rule High Severity
  • SRG-APP-000091-NDM-000223

    Group
  • The ICS must be configured to generate audit records when successful/unsuccessful attempts to access privileges occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-APP-000001-NDM-000200

    Group
  • The ICS must be configured to limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.

    Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administr...
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    Group
  • The ICS must be configured to display the Standard Mandatory DOD Notice and Consent Banner before granting access to manage the device.

    Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executi...
    Rule Medium Severity
  • SRG-APP-000065-NDM-000214

    Group
  • The ICS must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
    Rule Medium Severity
  • SRG-APP-000516-NDM-000340

    Group
  • The ICS must be configured to conduct backups of system level information contained in the information system when changes occur.

    System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execu...
    Rule Medium Severity
  • SRG-APP-000435-NDM-000315

    Group
  • The ICS must be configured to protect against known types of denial-of-service (DoS) attacks by enabling JITC mode.

    This configuration protects the confidentiality of Web UI session and guards against DoS attacks. If JITC (DODIN APL) Mode is enabled, then the following protections are enforced: - Log support for...
    Rule High Severity
  • SRG-APP-000412-NDM-000331

    Group
  • The ICS must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 approved algorithm.

    If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to eavesdropping, potentially putting sensitive data (including a...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules