Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity
  • SRG-APP-000148-NDM-000346

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.

    &lt;VulnDiscussion&gt;Authentication for administrative (privileged level) access to the device is required at all times. An account can be created...
    Rule Medium Severity
  • SRG-APP-000065-NDM-000214

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The network device must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule High Severity
  • SRG-APP-000395-NDM-000347

    <GroupDescription></GroupDescription>
    Group
  • The network device must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be us...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules