III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Systems must be monitored for attempts to use local accounts to log on remotely from other systems.
<VulnDiscussion>Monitoring for the use of local accounts to log on remotely from other systems may indicate attempted lateral movement in a P...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Systems must be monitored for remote desktop logons.
<VulnDiscussion>Remote Desktop activity for administration should be limited to specific administrators, and from limited management workstat...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Active Directory data must be backed up daily for systems with a Risk Management Framework categorization for Availability of moderate or high. Systems with a categorization of low must be backed up weekly.
<VulnDiscussion>Failure to maintain a current backup of directory data could make it difficult or impossible to recover from incidents includ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Each cross-directory authentication configuration must be documented.
<VulnDiscussion>Active Directory (AD) external, forest, and realm trust configurations are designed to extend resource access to a wider rang...Rule Low Severity -
SRG-OS-000423
<GroupDescription></GroupDescription>Group -
A VPN must be used to protect directory network traffic for directory service implementation spanning enclave boundaries.
<VulnDiscussion>The normal operation of AD requires the use of IP network ports and protocols to support queries, replication, user authentic...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Accounts from outside directories that are not part of the same organization or are not subject to the same security policies must be removed from all highly privileged groups.
<VulnDiscussion>Membership in certain default directory groups assigns a high privilege level for access to the directory. In AD, membership ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Inter-site replication must be enabled and configured to occur at least daily.
<VulnDiscussion>Timely replication makes certain that directory service data is consistent across all servers that support the same scope of ...Rule Medium Severity -
SRG-OS-000032
<GroupDescription></GroupDescription>Group -
If a VPN is used in the AD implementation, the traffic must be inspected by the network Intrusion detection system (IDS).
<VulnDiscussion>To provide data confidentiality, a VPN is configured to encrypt the data being transported. While this protects the data, som...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Active Directory implementation information must be added to the organization contingency plan where the Risk Management Framework categorization for Availability is moderate or high.
<VulnDiscussion>When an incident occurs that requires multiple Active Directory (AD) domain controllers to be rebuilt, it is critical to unde...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Active Directory must be supported by multiple domain controllers where the Risk Management Framework categorization for Availability is moderate or high.
<VulnDiscussion>In Active Directory (AD) architecture, multiple domain controllers provide availability through redundancy. If an AD domain ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The impact of INFOCON changes on the cross-directory authentication configuration must be considered and procedures documented.
<VulnDiscussion>When incidents occur that require a change in the INFOCON status, it may be necessary to take action to restrict or disable c...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.