Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • The ICS must terminate remote access network connections after an organization-defined time period.

    This SRG requirement is in response to the DoD OIG Audit of Maintaining Cybersecurity in the Coronavirus Disease-2019 Telework Environment. Best practice is to terminate inactive user sessions aft...
    Rule Medium Severity
  • SRG-NET-000334-VPN-001260

    Group
  • The ICS must be configured to send user traffic log data to redundant central log server.

    The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate security personnel. The stored log data can used to detect weaknesses in se...
    Rule Medium Severity
  • SRG-NET-000335-VPN-001270

    Group
  • The ICS must be configured to forward all log failure events where the detection and/or prevention function is unable to write events to local log record or send an SNMP trap that can be forwarded to the SCA and ISSO.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impe...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules