Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000373-NDM-000298

    Group
  • Riverbed Optimization System (RiOS) must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.

    The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other ...
    Rule Medium Severity
  • SRG-APP-000381-NDM-000305

    Group
  • Riverbed Optimization System (RiOS) must generate a log event for the enforcement actions used to restrict access associated with changes to the device.

    Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to identify attempted attacks, and an audit trail will not be available for...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    Group
  • Riverbed Optimization System (RiOS) must enable the password authentication control policy to ensure password complexity controls and other password policy requirements are enforced.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks.
    Rule Medium Severity
  • SRG-APP-000516-NDM-000336

    Group
  • Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally manage authentication settings.

    The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrato...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000337

    Group
  • Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally apply authentication settings.

    The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrato...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000338

    Group
  • Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally verify authentication settings.

    The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrato...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    Group
  • Riverbed Optimization System (RiOS) must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000341

    Group
  • Riverbed Optimization System (RiOS) must back up the system configuration files when configuration changes are made to the device.

    Information system backup is a critical step in maintaining data assurance and availability. Information system and security-related documentation contains information pertaining to system configur...
    Rule Medium Severity
  • SRG-APP-000156-NDM-000250

    Group
  • Riverbed Optimization System (RiOS) must implement replay-resistant authentication mechanisms for network access to privileged accounts.

    A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...
    Rule Medium Severity
  • SRG-APP-000395-NDM-000310

    Group
  • Riverbed Optimization System (RiOS) must authenticate network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

    Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules