III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000389-NDM-000306
Group -
The DataPower Gateway must require users to re-authenticate when privilege escalation or role changes occur.
Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When devices provide the capability to change security roles, it is critical the us...Rule Medium Severity -
SRG-APP-000395-NDM-000310
Group -
The DataPower Gateway must use SNMPv3.
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...Rule High Severity -
SRG-APP-000400-NDM-000313
Group -
The DataPower Gateway must prohibit the use of cached authenticators after an organization-defined time period.
Some authentication implementations can be configured to use cached authenticators. If cached authentication information is out-of-date, the validity of the authentication information may be quest...Rule Medium Severity -
SRG-APP-000411-NDM-000330
Group -
The IBM DataPower Gateway must only allow the use of protocols that implement cryptographic mechanisms to protect the integrity and confidentiality of management communications.
This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryp...Rule Medium Severity -
SRG-APP-000515-NDM-000325
Group -
The DataPower Gateway must off-load audit records onto a different system or media than the system being audited.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.Rule Medium Severity -
SRG-APP-000516-NDM-000333
Group -
The DataPower Gateway must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and in accordance with CJCSM 6510.01B.
By immediately displaying an alarm message, potential security violations can be identified more quickly even when administrators are not logged into the network device. An example of a mechanism t...Rule Medium Severity -
SRG-APP-000516-NDM-000334
Group -
The DataPower Gateway must generate audit log events for a locally developed list of auditable events.
Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity...Rule Medium Severity -
SRG-APP-000516-NDM-000336
Group -
The DataPower Gateway must employ automated mechanisms to centrally manage authentication settings.
The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrato...Rule Medium Severity -
SRG-APP-000516-NDM-000337
Group -
The DataPower Gateway must employ automated mechanisms to centrally apply authentication settings.
The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrato...Rule Medium Severity -
SRG-APP-000516-NDM-000338
Group -
The DataPower Gateway must employ automated mechanisms to centrally verify authentication settings.
The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrato...Rule Medium Severity -
SRG-APP-000516-NDM-000340
Group -
The DataPower Gateway must support organizational requirements to conduct backups of system level information contained in the information system when changes occur or weekly, whichever is sooner.
System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execu...Rule Medium Severity -
SRG-APP-000516-NDM-000342
Group -
The DataPower Gateway must employ automated mechanisms to assist in the tracking of security incidents.
Despite the investment in perimeter defense technologies, enclaves are still faced with detecting, analyzing, and remediating network breaches and exploits that have made it past the network device...Rule Medium Severity -
SRG-APP-000516-NDM-000344
Group -
The DataPower Gateway must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure...Rule Medium Severity -
SRG-APP-000038-NDM-000213
Group -
The DataPower Gateway must not use 0.0.0.0 as the management IP address.
If 0.0.0.0 as the management IP address, the DataPower appliance will listen on all configured interfaces for management traffic. This can allow an attacker to gain privileged-level access from an ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.