Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000213-ALG-000107

    <GroupDescription></GroupDescription>
    Group
  • The ALG must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000025

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000040

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000111

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...
    Rule Medium Severity
  • SRG-NET-000228-ALG-000108

    <GroupDescription></GroupDescription>
    Group
  • The ALG must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.

    &lt;VulnDiscussion&gt;Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded an...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules