Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Shares private/secret cryptographic keys file must be owned by nobody to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Shares private/secret cryptographic keys file must have a mode of 0400 or less permissive to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000150

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Endpoint must be configured to comply with the required TLS settings in NIST SP 800-52.

    &lt;VulnDiscussion&gt;SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthori...
    Rule High Severity
  • SRG-NET-000132-ALG-000087

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Endpoint must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Endpoint must be configured to protect the authenticity of communications sessions.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules