Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must lock accounts after three unsuccessful login attempts within a 15-minute timeframe.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-NET-000053-ALG-000001

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must prevent concurrent logins for all accounts.

    &lt;VulnDiscussion&gt;Limiting the number of current sessions per user is helpful in limiting risks related to DoS attacks. This requirement addre...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must require password complexity features to be enabled.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-NET-000169-ALG-000102

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity f...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex passwords must be prohibited from reuse for a minimum of five generations.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex user account passwords must have a 60-day maximum password lifetime restriction.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the ...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000011

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Faspex feature must be configured to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-NET-000132-ALG-000087

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-NET-000138-ALG-000063

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-NET-000063-ALG-000012

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must be configured to use NIST FIPS-validated cryptography to protect the integrity of file transfers.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule High Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-NET-000098-ALG-000056

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Faspex must protect audit information from unauthorized modification.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Faspex private/secret cryptographic keys file must be group-owned by faspex to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Faspex private/secret cryptographic keys file must be owned by faspex to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000015-ALG-000016

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Faspex Server must restrict users from using transfer services by default.

    &lt;VulnDiscussion&gt;Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authoriz...
    Rule Medium Severity
  • SRG-NET-000015-ALG-000016

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Faspex Server must restrict users read, write, and browse permissions by default.

    &lt;VulnDiscussion&gt;Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authoriz...
    Rule Medium Severity
  • SRG-NET-000213-ALG-000107

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Shares interactive session must be terminated after 10 minutes of inactivity for non-privileged and privileged sessions.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-NET-000041-ALG-000022

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares must be configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the publicly accessible network element ens...
    Rule Low Severity
  • SRG-NET-000339-ALG-000090

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;For remote access to non-privileged accounts, the purpose of requiring a device that is separate from the information system ...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares must lock accounts after three unsuccessful login attempts within a 15-minute timeframe.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares must require password complexity features to be enabled.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-NET-000169-ALG-000102

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity f...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares user account passwords must have a 60-day maximum password lifetime restriction.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the ...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000011

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Shares feature must be configured to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-NET-000132-ALG-000087

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules