Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000164-NDM-000252

    <GroupDescription></GroupDescription>
    Group
  • The network device must enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000080-NDM-000345

    <GroupDescription></GroupDescription>
    Group
  • The network device must not have any default manufacturer passwords when deployed.

    &lt;VulnDiscussion&gt;Network devices not protected with strong password schemes provide the opportunity for anyone to crack the password and gain ...
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    <GroupDescription></GroupDescription>
    Group
  • The network device must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.

    &lt;VulnDiscussion&gt;All network devices must present a DoD-approved warning banner prior to a system administrator logging on. The banner should ...
    Rule Medium Severity
  • SRG-APP-000190-NDM-000267

    <GroupDescription></GroupDescription>
    Group
  • The network device must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule High Severity
  • SRG-APP-000153-NDM-000249

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to authenticate each administrator prior to authorizing privileges based on assignment of group or role.

    &lt;VulnDiscussion&gt;To ensure individual accountability and prevent unauthorized access, administrators must be individually identified and authe...
    Rule Medium Severity
  • SRG-APP-000033-NDM-000212

    <GroupDescription></GroupDescription>
    Group
  • The network device must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.

    &lt;VulnDiscussion&gt;To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...
    Rule High Severity
  • SRG-APP-000412-NDM-000331

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.

    &lt;VulnDiscussion&gt;This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead...
    Rule High Severity
  • SRG-APP-000503-NDM-000320

    <GroupDescription></GroupDescription>
    Group
  • The network device must generate audit records when successful/unsuccessful logon attempts occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000351

    <GroupDescription></GroupDescription>
    Group
  • The network device must be running an operating system release that is currently supported by the vendor.

    &lt;VulnDiscussion&gt;Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated...
    Rule High Severity
  • SRG-APP-000516-NDM-000336

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to use an authentication server to authenticate users prior to granting administrative access.

    &lt;VulnDiscussion&gt;Centralized management of authentication settings increases the security of remote and nonlocal access methods. This is parti...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules