Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • The ICS must be configured to disable split-tunneling for remote client VPNs.

    Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to exfiltration of organizational information. A VPN hardware or software c...
    Rule Medium Severity
  • SRG-NET-000550-VPN-002360

    Group
  • The ICS that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) must configure SNMPv3 to use FIPS-validated AES cipher block algorithm.

    Without device-to-device authentication, communications with malicious devices may be established. Bidirectional authentication provides stronger safeguards to validate the identity of other device...
    Rule Medium Severity
  • SRG-NET-000019-VPN-000040

    Group
  • The ICS must be configured to ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.

    Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules