No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000224-NDM-000270
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must generate unique session identifiers using a FIPS 140-2 approved random number generator.
<VulnDiscussion>Sequentially generated session IDs can be easily guessed by an attacker. Employing the concept of randomness in the generatio...Rule Medium Severity -
SRG-APP-000268-NDM-000274
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
<VulnDiscussion>Predictable failure prevention requires organizational planning to address device failure issues. If components key to mainta...Rule Medium Severity -
SRG-APP-000291-NDM-000275
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must generate account activity alerts that are forwarded to the administrators and Information System Security Officer (ISSO). Activity includes, creation, removal, modification and re-enablement after being previously disabled.
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestab...Rule Medium Severity -
SRG-APP-000295-NDM-000279
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must automatically terminate a network administrator session after organization-defined conditions or trigger events requiring session disconnect.
<VulnDiscussion>Automatic session termination addresses the termination of administrator-initiated logical sessions in contrast to the termin...Rule Medium Severity -
SRG-APP-000317-NDM-000282
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must terminate shared/group account credentials when members leave the group.
<VulnDiscussion>A shared/group account credential is a shared form of authentication that allows multiple individuals to access the MQ Applia...Rule Medium Severity -
SRG-APP-000346-NDM-000291
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must notify the administrator, upon successful logon (access), of the location of last logon (terminal or IP address) in addition to the result, date and time of the last logon (access).
<VulnDiscussion>Administrators need to be aware of activity that occurs regarding their account. Providing them with information deemed impor...Rule Medium Severity -
SRG-APP-000359-NDM-000294
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must generate an immediate alert when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
<VulnDiscussion>If security personnel are not notified immediately upon storage volume utilization reaching 75 percent, they are unable to pl...Rule Medium Severity -
SRG-APP-000371-NDM-000296
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must compare internal information system clocks at least every 24 hours with an authoritative time server.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity -
SRG-APP-000372-NDM-000297
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must synchronize internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity -
SRG-APP-000373-NDM-000298
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
<VulnDiscussion>The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...Rule Medium Severity -
SRG-APP-000391-NDM-000308
<GroupDescription></GroupDescription>Group -
WebGUI access to the MQ Appliance network device must accept Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the us...Rule Medium Severity -
SRG-APP-000392-NDM-000309
<GroupDescription></GroupDescription>Group -
WebGUI access to the MQ Appliance network device must electronically verify Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the us...Rule Medium Severity -
SRG-APP-000400-NDM-000313
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must prohibit the use of cached authenticators after an organization-defined time period.
<VulnDiscussion>Some authentication implementations can be configured to use cached authenticators. If cached authentication information is...Rule Medium Severity -
SRG-APP-000411-NDM-000330
<GroupDescription></GroupDescription>Group -
Applications used for nonlocal maintenance sessions using the MQ Appliance WebGUI must implement cryptographic mechanisms to protect the confidentiality and integrity of nonlocal maintenance and diagnostic communications.
<VulnDiscussion>This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead...Rule Medium Severity -
SRG-APP-000506-NDM-000323
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must generate audit records when concurrent logons from different workstations occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000509-NDM-000324
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000515-NDM-000325
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must off-load audit records onto a different system or media than the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Using a syslog logging t...Rule Medium Severity -
SRG-APP-000516-NDM-000333
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and in association with CJCSM 6510.01B.
<VulnDiscussion>By immediately displaying an alarm message, potential security violations can be identified more quickly even when administra...Rule Medium Severity -
SRG-APP-000516-NDM-000336
<GroupDescription></GroupDescription>Group -
Administrative accounts for device management must be configured on the authentication server and not the MQ Appliance network device itself (except for the emergency administration account).
<VulnDiscussion>The use of authentication servers or other centralized management servers for providing centralized authentication services i...Rule Medium Severity -
SRG-APP-000516-NDM-000337
<GroupDescription></GroupDescription>Group -
Access to the MQ Appliance network device must employ automated mechanisms to centrally apply authentication settings.
<VulnDiscussion>The use of authentication servers or other centralized management servers for providing centralized authentication services i...Rule Medium Severity -
SRG-APP-000516-NDM-000340
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must support organizational requirements to conduct backups of system level information contained in the information system when changes occur or weekly, whichever is sooner.
<VulnDiscussion>System-level information includes default and customized settings and security attributes, including ACLs that relate to the ...Rule Medium Severity -
SRG-APP-000516-NDM-000344
<GroupDescription></GroupDescription>Group -
The MQ Appliance network device must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
<VulnDiscussion>For user certificates, each organization obtains certificates from an approved, shared service provider as required by OMB po...Rule Medium Severity -
SRG-APP-000408-NDM-000314
<GroupDescription></GroupDescription>Group -
SSH CLI access to the MQ Appliance management interface must be restricted to approved management workstations.
<VulnDiscussion>The approved method for authenticating to systems is via two-factor authentication. Two-factor authentication is defined as u...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.