Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000319-NDM-000283

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to automatically audit account-enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestab...
    Rule Medium Severity
  • SRG-APP-000329-NDM-000287

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.

    &lt;VulnDiscussion&gt;Organizations can create specific roles based on job functions and the authorizations (i.e., privileges) to perform needed op...
    Rule Medium Severity
  • SRG-APP-000357-NDM-000293

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    &lt;VulnDiscussion&gt;In order to ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able ...
    Rule Medium Severity
  • SRG-APP-000373-NDM-000298

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.

    &lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...
    Rule Medium Severity
  • SRG-APP-000380-NDM-000304

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce access restrictions associated with changes to device configuration.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to device configuration may have significant effects o...
    Rule Medium Severity
  • SRG-APP-000381-NDM-000305

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to audit the enforcement actions used to restrict access associated with changes to the device.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to ...
    Rule Medium Severity
  • SRG-APP-000435-NDM-000315

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to protect against or limit the effects of all known types of Denial of Service (DoS) attacks on the BIG-IP appliance management network by limiting the number of concurrent sessions.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule High Severity
  • SRG-APP-000515-NDM-000325

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to off-load audit records onto a different system or media than the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuring the network device to implement organization-wide security implementation guides and security checklists ensures ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000336

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to employ automated mechanisms to centrally manage authentication settings.

    &lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services i...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000340

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must create backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.

    &lt;VulnDiscussion&gt;System-level information includes default and customized settings and security attributes, including ACLs that relate to the ...
    Rule Low Severity
  • SRG-APP-000516-NDM-000341

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to create backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.

    &lt;VulnDiscussion&gt;Information system backup is a critical step in maintaining data assurance and availability. Information system and security-...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to obtain its public key certificates from an appropriate certificate policy through a DoD-approved service provider.

    &lt;VulnDiscussion&gt;For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB p...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP must ensure SSH is disabled for root user logon to prevent remote access using the root account.

    &lt;VulnDiscussion&gt;The F5 BIG-IP shell must be locked down to limit the ability to modify the configuration through the shell. Preventing attack...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must provide automated support for account management functions.

    &lt;VulnDiscussion&gt;Account management functions include: assignment of group or role membership; identifying account type; specifying user acces...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must automatically remove or disable temporary user accounts after 72 hours.

    &lt;VulnDiscussion&gt;Temporary accounts are established as part of normal account activation procedures when there is a need for short-term accoun...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must automatically disable accounts after a 35-day period of account inactivity.

    &lt;VulnDiscussion&gt;Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • Upon successful logon, the BIG-IP appliance must be configured to notify the administrator of the date and time of the last logon.

    &lt;VulnDiscussion&gt;Administrators need to be aware of activity that occurs regarding their network device management account. Providing administ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • Upon successful logon, the BIG-IP appliance must be configured to notify the administrator of the number of unsuccessful logon attempts since the last successful logon.

    &lt;VulnDiscussion&gt;Administrators need to be aware of activity that occurs regarding their network device management account. Providing administ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Low Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to protect audit information from any type of unauthorized read access.

    &lt;VulnDiscussion&gt;Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully au...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to use NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest.

    &lt;VulnDiscussion&gt;Audit records may be tampered with. If the integrity of audit data were to become compromised, then forensic analysis and dis...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to uniquely identify and authenticate organizational administrators (or processes acting on behalf of organizational administrators).

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational administrators must be uniquely identified and au...
    Rule High Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to prohibit password reuse for a minimum of five generations.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP appliance must be configured to enforce 24 hours/1 day as the minimum password lifetime.

    &lt;VulnDiscussion&gt;Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforce...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules