Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000065-NDM-000214

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.

    &lt;VulnDiscussion&gt;Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notifi...
    Rule Medium Severity
  • SRG-APP-000080-NDM-000345

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must not have any default manufacturer passwords when deployed.

    &lt;VulnDiscussion&gt;Network devices not protected with strong password schemes provide the opportunity for anyone to crack the password and gain ...
    Rule Medium Severity
  • SRG-APP-000164-NDM-000252

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000166-NDM-000254

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must enforce password complexity by requiring that at least one upper-case character be used.

    &lt;VulnDiscussion&gt;Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...
    Rule Medium Severity
  • SRG-APP-000167-NDM-000255

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must enforce password complexity by requiring that at least one lower-case character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000168-NDM-000256

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must enforce password complexity by requiring that at least one numeric character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000169-NDM-000257

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must enforce password complexity by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000170-NDM-000329

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must require that when a password is changed, the characters are changed in at least eight of the positions within the password.

    &lt;VulnDiscussion&gt;If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...
    Rule Medium Severity
  • SRG-APP-000190-NDM-000267

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule High Severity
  • SRG-APP-000516-NDM-000336

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.

    &lt;VulnDiscussion&gt;Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control ...
    Rule High Severity
  • SRG-APP-000516-NDM-000344

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

    &lt;VulnDiscussion&gt;For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB p...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000350

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must forward critical alerts (at a minimum) to the system administrators and the ISSO.

    &lt;VulnDiscussion&gt;Alerts are essential to let the system administrators and security personnel know immediately of issues which may impact the ...
    Rule High Severity
  • SRG-APP-000516-NDM-000351

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must be running an operating system release that is currently supported by the vendor.

    &lt;VulnDiscussion&gt;Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated...
    Rule High Severity
  • SRG-APP-000001-NDM-000200

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must limit the number of concurrent sessions to an organization-defined number for each administrator account.

    &lt;VulnDiscussion&gt;Device management includes the ability to control the number of administrators and management sessions that manage a device. ...
    Rule Medium Severity
  • SRG-APP-000373-NDM-000298

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must be configured to synchronize internal information system clocks using an authoritative time source.

    &lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...
    Rule Medium Severity
  • SRG-APP-000515-NDM-000325

    <GroupDescription></GroupDescription>
    Group
  • The HPE Nimble must configure a syslog server onto a different system or media than the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. UDP is used to communic...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • HPE Nimble must be configured to disable HPE InfoSight.

    &lt;VulnDiscussion&gt;DoD requires that the Mission Owner uses only the cloud services offering listed in either the FedRAMP or DISA PA DoD Cloud C...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • HPE Nimble must not be configured to use "HPE Greenlake: Data Services Cloud Console".

    &lt;VulnDiscussion&gt;DOD requires that the Mission Owner uses only the cloud services offering listed in either the FedRAMP or DISA PA DOD Cloud C...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • HPE Alletra 5000/6000 must be configured to disable management by "HPE Greenlake: Data Services Cloud Console".

    &lt;VulnDiscussion&gt;DOD requires that the Mission Owner uses only the cloud services offering listed in either the FedRAMP or DISA PA DOD Cloud C...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules