No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The network device must be running an operating system release that is currently supported by the vendor.
<VulnDiscussion>Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated...Rule High Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The network device must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuring the network device to implement organization-wide security implementation guides and security checklists ensures ...Rule Medium Severity -
SRG-APP-000149
<GroupDescription></GroupDescription>Group -
The network device must be configured to use DoD PKI as multi-factor authentication (MFA) for interactive logins.
<VulnDiscussion>Multi-factor authentication (MFA) is when two or more factors are used to confirm the identity of an individual who is reques...Rule High Severity -
SRG-APP-000175
<GroupDescription></GroupDescription>Group -
The network device must be configured to use DoD approved OCSP responders or CRLs to validate certificates used for PKI-based authentication.
<VulnDiscussion>Once issued by a DoD certificate authority (CA), public key infrastructure (PKI) certificates are typically valid for 3 years...Rule High Severity -
SRG-APP-000177
<GroupDescription></GroupDescription>Group -
The network device, for PKI-based authentication, must be configured to map validated certificates to unique user accounts.
<VulnDiscussion>Without mapping the PKI certificate to a unique user account, the ability to determine the identities of individuals or the s...Rule High Severity -
SRG-APP-000457
<GroupDescription></GroupDescription>Group -
The application must install security-relevant firmware updates within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>Security flaws with firmware are discovered daily. Vendors are constantly updating and patching their products to address new...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.