Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000065-NDM-000214

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-APP-000164-NDM-000252

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000190-NDM-000267

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must terminate the device management session at the end of the session or after 10 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule High Severity
  • SRG-APP-000373-NDM-000298

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must be configured to synchronize internal information system clocks using redundant authoritative time sources.

    &lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...
    Rule Medium Severity
  • SRG-APP-000374-NDM-000299

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Medium Severity
  • SRG-APP-000400-NDM-000313

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;Some authentication implementations can be configured to use cached authenticators. If cached authentication information is ...
    Rule Medium Severity
  • SRG-APP-000435-NDM-000315

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000499-NDM-000319

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-APP-000515-NDM-000325

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must be configured to send logs to a central log server.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000334

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must generate log records for the info level to capture the DoD-required auditable events.

    &lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000336

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must integrate with either VMware Identity Manager (vIDM) or VMware Workspace ONE Access.

    &lt;VulnDiscussion&gt;Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control ...
    Rule High Severity
  • SRG-APP-000516-NDM-000340

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must be configured to conduct backups on an organizationally defined schedule.

    &lt;VulnDiscussion&gt;System-level information includes default and customized settings and security attributes, including ACLs that relate to the ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000341

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.

    &lt;VulnDiscussion&gt;Information system backup is a critical step in maintaining data assurance and availability. Information system and security-...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must obtain its public key certificates from an approved DoD certificate authority.

    &lt;VulnDiscussion&gt;For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB p...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000350

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the Information System Security Officer (ISSO).

    &lt;VulnDiscussion&gt;The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate sec...
    Rule High Severity
  • SRG-APP-000516-NDM-000351

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must be running a release that is currently supported by the vendor.

    &lt;VulnDiscussion&gt;Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated...
    Rule High Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must not provide environment information to third parties.

    &lt;VulnDiscussion&gt;Providing technical details about an environment's infrastructure to third parties could unknowingly expose sensitive informa...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must disable SSH.

    &lt;VulnDiscussion&gt;The NSX-T shell provides temporary access to commands essential for server maintenance. Intended primarily for use in break-f...
    Rule Low Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must disable unused local accounts.

    &lt;VulnDiscussion&gt;Prior to NSX-T 3.1 and earlier, there are three local accounts: root, admin, and audit. These local accounts could not be dis...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must disable TLS 1.1 and enable TLS 1.2.

    &lt;VulnDiscussion&gt;TLS 1.0 and 1.1 are deprecated protocols with well-published shortcomings and vulnerabilities. TLS 1.2 must be enabled on all...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must disable SNMP v2.

    &lt;VulnDiscussion&gt;SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous ver...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must enable the global FIPS compliance mode for load balancers.

    &lt;VulnDiscussion&gt;If unsecured protocols (lacking cryptographic mechanisms) are used for load balancing, the contents of those sessions will be...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules