Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • WLAN SSIDs must be changed from the manufacturer's default to a pseudo random word that does not identify the unit, base, organization, etc.

    &lt;VulnDiscussion&gt;An SSID identifying the unit, site, or purpose of the WLAN or that is set to the manufacturer default may cause an OPSEC vuln...
    Rule Low Severity
  • SRG-NET-000063

    <GroupDescription></GroupDescription>
    Group
  • WLAN components must be Wi-Fi Alliance certified with WPA2 or WPA3.

    &lt;VulnDiscussion&gt;Wi-Fi Alliance certification ensures compliance with DoD interoperability requirements between various WLAN products.&lt;/Vul...
    Rule Medium Severity
  • SRG-NET-000151

    <GroupDescription></GroupDescription>
    Group
  • WLAN components must be FIPS 140-2 or FIPS 140-3 certified and configured to operate in FIPS mode.

    &lt;VulnDiscussion&gt;If the DoD WLAN components (WLAN AP, controller, or client) are not NIST FIPS 140-2/FIPS 140-3 (Cryptographic Module Validati...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • Wireless access points and bridges must be placed in dedicated subnets outside the enclave's perimeter.

    &lt;VulnDiscussion&gt;If an adversary is able to compromise an access point or controller that is directly connected to an enclave network, the adv...
    Rule Medium Severity
  • SRG-NET-000205

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.

    &lt;VulnDiscussion&gt;The OOBM access switch will connect to the management interface of the managed network elements. The management interface can...
    Rule Medium Severity
  • SRG-NET-000131

    <GroupDescription></GroupDescription>
    Group
  • The network device must not be configured to have any feature enabled that calls home to the vendor.

    &lt;VulnDiscussion&gt;Call-home services will routinely send data such as configuration and diagnostic information to the vendor for routine or eme...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules