Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000344-ALG-000098

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Endpoint must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;If the cached authenticator information is out of date, the validity of the authentication information may be questionable. ...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000150

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Server must be configured to comply with the required TLS settings in NIST SP 800-52.

    &lt;VulnDiscussion&gt;SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthori...
    Rule High Severity
  • SRG-NET-000132-ALG-000087

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Server must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Server must be configured to protect the authenticity of communications sessions.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000011

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Server must be configured to use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule High Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Server must configure the SELinux context type to allow the "aspshell".

    &lt;VulnDiscussion&gt;Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Server must enable content protection for each transfer user by encrypting passphrases used for server-side encryption at rest (SSEAR).

    &lt;VulnDiscussion&gt;Configuring the network element to implement organization-wide security implementation guides and security checklists ensures...
    Rule Medium Severity
  • SRG-NET-000015-ALG-000016

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Server must enable password protection of the node database.

    &lt;VulnDiscussion&gt;Configuring the network element to implement organization-wide security implementation guides and security checklists ensures...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000011

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Server must enable the use of dynamic token encryption keys.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule Medium Severity
  • SRG-NET-000063-ALG-000012

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Server must have a master-key set to encrypt the dynamic token encryption key.

    &lt;VulnDiscussion&gt;Configuring the network element to implement organization-wide security implementation guides and security checklists ensures...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules