Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000041-VPN-000110

    <GroupDescription></GroupDescription>
    Group
  • The ICS must display the Standard Mandatory DOD Notice and Consent Banner before granting access to users.

    &lt;VulnDiscussion&gt;Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notifi...
    Rule Medium Severity
  • SRG-NET-000053-VPN-000170

    <GroupDescription></GroupDescription>
    Group
  • The ICS must be configured to limit the number of concurrent sessions for user accounts to one.

    &lt;VulnDiscussion&gt;VPN gateway management includes the ability to control the number of users and user sessions that utilize a VPN gateway. Limi...
    Rule Medium Severity
  • SRG-NET-000062-VPN-000200

    <GroupDescription></GroupDescription>
    Group
  • The ICS must be configured to use TLS 1.2, at a minimum.

    &lt;VulnDiscussion&gt;Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...
    Rule High Severity
  • SRG-NET-000078-VPN-000290

    <GroupDescription></GroupDescription>
    Group
  • The ICS must be configured to generate log records containing sufficient information about where, when, identity, source, or outcome of the events.

    &lt;VulnDiscussion&gt;Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to...
    Rule Low Severity
  • SRG-NET-000138-VPN-000490

    <GroupDescription></GroupDescription>
    Group
  • The ICS must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-NET-000140-VPN-000500

    <GroupDescription></GroupDescription>
    Group
  • The ICS must be configured to use multifactor authentication (e.g., DOD PKI) for network access to nonprivileged accounts.

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, nonprivileged users must use multifactor authentication to preve...
    Rule High Severity
  • SRG-NET-000164-VPN-000560

    <GroupDescription></GroupDescription>
    Group
  • The ICS, when utilizing PKI-based authentication, must be configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    &lt;VulnDiscussion&gt;Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...
    Rule Medium Severity
  • SRG-NET-000213-VPN-000721

    <GroupDescription></GroupDescription>
    Group
  • The ICS must terminate remote access network connections after an organization-defined time period.

    &lt;VulnDiscussion&gt;This SRG requirement is in response to the DoD OIG Audit of Maintaining Cybersecurity in the Coronavirus Disease-2019 Telewor...
    Rule Medium Severity
  • SRG-NET-000334-VPN-001260

    <GroupDescription></GroupDescription>
    Group
  • The ICS must be configured to send user traffic log data to redundant central log server.

    &lt;VulnDiscussion&gt;The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate sec...
    Rule Medium Severity
  • SRG-NET-000335-VPN-001270

    <GroupDescription></GroupDescription>
    Group
  • The ICS must be configured to forward all log failure events where the detection and/or prevention function is unable to write events to local log record or send an SNMP trap that can be forwarded to the SCA and ISSO.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-NET-000343-VPN-001370

    <GroupDescription></GroupDescription>
    Group
  • The ICS must be configured to authenticate all clients before establishing a connection.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-NET-000352-VPN-001460

    <GroupDescription></GroupDescription>
    Group
  • The ICS must be configured to use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The National Secu...
    Rule Medium Severity
  • SRG-NET-000369-VPN-001620

    <GroupDescription></GroupDescription>
    Group
  • The ICS must be configured to disable split-tunneling for remote client VPNs.

    &lt;VulnDiscussion&gt;Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to e...
    Rule Medium Severity
  • SRG-NET-000550-VPN-002360

    <GroupDescription></GroupDescription>
    Group
  • The ICS that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) must configure SNMPv3 to use FIPS-validated AES cipher block algorithm.

    &lt;VulnDiscussion&gt;Without device-to-device authentication, communications with malicious devices may be established. Bidirectional authenticati...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules