Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • IA-11.02.01

    <GroupDescription></GroupDescription>
    Group
  • Information Assurance - Unauthorized Wireless Devices - Portable Electronic Devices (PEDs) Used in Classified Processing Areas without Certified TEMPEST Technical Authority (CTTA) Review and Authorizing Official (AO) Approval.

    &lt;VulnDiscussion&gt;Allowing wireless devices in the vicinity of classified processing or discussion could directly result in the loss or comprom...
    Rule Medium Severity
  • IA-11.03.01

    <GroupDescription></GroupDescription>
    Group
  • Information Assurance - Unauthorized Wireless Devices - No Formal Policy and/or Warning Signs

    &lt;VulnDiscussion&gt;Not having a wireless policy and/or warning signs at entrances could result in the unauthorized introduction of wireless devi...
    Rule Low Severity
  • IA-12.01.01

    <GroupDescription></GroupDescription>
    Group
  • Information Assurance - Network Connections - Physical Protection of Network Devices such as Routers, Switches and Hubs (Connected to SIPRNet or Other Classified Networks or Systems Being Inspected)

    &lt;VulnDiscussion&gt;SIPRNet or other classified network connections that are not properly protected in their physical environment are highly vuln...
    Rule High Severity
  • IA-12.01.02

    <GroupDescription></GroupDescription>
    Group
  • Information Assurance - Network Connections - Wall Jack Security on Classified Networks (SIPRNet or other Inspected Classified Network or System) Where Port Authentication Using IEEE 802.1X IS NOT Implemented

    &lt;VulnDiscussion&gt;Following is a summary of the primary requirement to use the IEEE 802.1X authentication protocol to secure SIPRNet ports (AKA...
    Rule High Severity
  • IA-12.02.01

    <GroupDescription></GroupDescription>
    Group
  • Information Assurance - Network Connections - Physical Protection of Unclassified (NIPRNet) Network Devices such as Routers, Switches and Hubs

    &lt;VulnDiscussion&gt;Unclassified (NIPRNet) network connections that are not properly protected in their physical environment are highly vulnerabl...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules