III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000174-AAA-000540
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to enforce a 60-day maximum password lifetime restriction.
<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals...Rule Medium Severity -
SRG-APP-000165-AAA-000550
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to prohibit password reuse for a minimum of five generations.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-APP-000397-AAA-000560
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to allow the use of a temporary password at initial logon with an immediate change to a permanent password.
<VulnDiscussion>Without providing this capability, an account may be created without a password. Non-repudiation cannot be guaranteed once an...Rule Medium Severity -
SRG-APP-000175-AAA-000570
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to only accept certificates issued by a DoD-approved Certificate Authority for PKI-based authentication.
<VulnDiscussion>Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...Rule High Severity -
SRG-APP-000175-AAA-000580
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to not accept certificates that have been revoked for PKI-based authentication.
<VulnDiscussion>Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...Rule High Severity -
SRG-APP-000176-AAA-000590
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to enforce authorized access to the corresponding private key for PKI-based authentication.
<VulnDiscussion>If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...Rule Medium Severity -
SRG-APP-000177-AAA-000600
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to map the authenticated identity to the user account for PKI-based authentication.
<VulnDiscussion>Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the indivi...Rule Medium Severity -
SRG-APP-000231-AAA-000610
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to protect the confidentiality and integrity of all information at rest.
<VulnDiscussion>Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and...Rule High Severity -
SRG-APP-000516-AAA-000620
<GroupDescription></GroupDescription>Group -
AAA Services must not be configured with shared accounts.
<VulnDiscussion>Shared accounts configured for use on a network device do not allow for accountability or repudiation of individuals using th...Rule Medium Severity -
SRG-APP-000516-AAA-000630
<GroupDescription></GroupDescription>Group -
AAA Services used to authenticate privileged users for device management must be configured to connect to the management network.
<VulnDiscussion>Using standardized authentication protocols such as RADIUS, TACACS+, and Kerberos, an authentication server provides centrali...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.