Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-NDM-000351

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must be running a release that is currently supported by the vendor.

    &lt;VulnDiscussion&gt;Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated...
    Rule High Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must not provide environment information to third parties.

    &lt;VulnDiscussion&gt;Providing technical details about an environment's infrastructure to third parties could unknowingly expose sensitive informa...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must disable SSH.

    &lt;VulnDiscussion&gt;The NSX-T shell provides temporary access to commands essential for server maintenance. Intended primarily for use in break-f...
    Rule Low Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must disable unused local accounts.

    &lt;VulnDiscussion&gt;Prior to NSX-T 3.1 and earlier, there are three local accounts: root, admin, and audit. These local accounts could not be dis...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Manager must disable TLS 1.1 and enable TLS 1.2.

    &lt;VulnDiscussion&gt;TLS 1.0 and 1.1 are deprecated protocols with well-published shortcomings and vulnerabilities. TLS 1.2 must be enabled on all...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules