Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-NDM-000344

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

    &lt;VulnDiscussion&gt;For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB p...
    Rule Medium Severity
  • SRG-APP-000268-NDM-000274

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must configure the maintenance and health monitoring to send an alarm when a critical condition occurs for a component.

    &lt;VulnDiscussion&gt;Predictable failure prevention requires organizational planning to address device failure issues. If components key to mainta...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must use only approved management services protocols.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule High Severity
  • SRG-APP-000156-NDM-000250

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must implement HTTPS-console to provide replay-resistant authentication mechanisms for network access to privileged accounts.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...
    Rule Medium Severity
  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must configure SNMPv3 so that cryptographically-based bidirectional authentication is used.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity
  • SRG-APP-000164-NDM-000252

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must be configured to enforce a minimum 15-character password length for local accounts.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000172-NDM-000259

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must transmit only encrypted representations of passwords.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...
    Rule High Severity
  • SRG-APP-000080-NDM-000345

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must not have a default manufacturer passwords when deployed.

    &lt;VulnDiscussion&gt;Network devices not protected with strong password schemes provide the opportunity for anyone to crack the password and gain ...
    Rule Medium Severity
  • SRG-APP-000179-NDM-000265

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must be configured to use only FIPS 140-2 approved algorithms for authentication to a cryptographic module with any application or protocol.

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not validated and therefore cannot be ...
    Rule High Severity
  • SRG-APP-000412-NDM-000331

    <GroupDescription></GroupDescription>
    Group
  • The Symantec ProxySG Web Management Console and SSH sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.

    &lt;VulnDiscussion&gt;This requirement requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet,...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules