Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000138-ALG-000063

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-NET-000063-ALG-000012

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares feature must be configured to use NIST FIPS-validated cryptography to protect the integrity of file transfers.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule High Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-NET-000098-ALG-000056

    <GroupDescription></GroupDescription>
    Group
  • IBM Aspera Shares must protect audit information from unauthorized deletion.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Shares private/secret cryptographic keys file must be group-owned by nobody to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Shares private/secret cryptographic keys file must be owned by nobody to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera Shares private/secret cryptographic keys file must have a mode of 0400 or less permissive to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000150

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Endpoint must be configured to comply with the required TLS settings in NIST SP 800-52.

    &lt;VulnDiscussion&gt;SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthori...
    Rule High Severity
  • SRG-NET-000132-ALG-000087

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Endpoint must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group
  • The IBM Aspera High-Speed Transfer Endpoint must be configured to protect the authenticity of communications sessions.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules