Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000373-NDM-000298

    <GroupDescription></GroupDescription>
    Group
  • Riverbed Optimization System (RiOS) must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.

    &lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...
    Rule Medium Severity
  • SRG-APP-000381-NDM-000305

    <GroupDescription></GroupDescription>
    Group
  • Riverbed Optimization System (RiOS) must generate a log event for the enforcement actions used to restrict access associated with changes to the device.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • Riverbed Optimization System (RiOS) must enable the password authentication control policy to ensure password complexity controls and other password policy requirements are enforced.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000336

    <GroupDescription></GroupDescription>
    Group
  • Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally manage authentication settings.

    &lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services i...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000337

    <GroupDescription></GroupDescription>
    Group
  • Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally apply authentication settings.

    &lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services i...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000338

    <GroupDescription></GroupDescription>
    Group
  • Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally verify authentication settings.

    &lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services i...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • Riverbed Optimization System (RiOS) must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000516-NDM-000341

    <GroupDescription></GroupDescription>
    Group
  • Riverbed Optimization System (RiOS) must back up the system configuration files when configuration changes are made to the device.

    &lt;VulnDiscussion&gt;Information system backup is a critical step in maintaining data assurance and availability. Information system and security-...
    Rule Medium Severity
  • SRG-APP-000156-NDM-000250

    <GroupDescription></GroupDescription>
    Group
  • Riverbed Optimization System (RiOS) must implement replay-resistant authentication mechanisms for network access to privileged accounts.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...
    Rule Medium Severity
  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • Riverbed Optimization System (RiOS) must authenticate network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules