III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000001-NDM-000200
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must limit the number of concurrent sessions to the Configuration Utility to 10 or an organization-defined number.
<VulnDiscussion>Device management includes the ability to control the number of administrators and management sessions that manage a device. ...Rule Medium Severity -
SRG-APP-000026-NDM-000208
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must automatically audit account creation.
<VulnDiscussion>Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing...Rule Medium Severity -
SRG-APP-000027-NDM-000209
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must automatically audit account modification.
<VulnDiscussion>Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security...Rule Medium Severity -
SRG-APP-000028-NDM-000210
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must automatically audit account-disabling actions.
<VulnDiscussion>Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting acces...Rule Medium Severity -
SRG-APP-000029-NDM-000211
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must automatically audit account removal actions.
<VulnDiscussion>Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting acces...Rule Medium Severity -
SRG-APP-000033-NDM-000212
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule High Severity -
SRG-APP-000065-NDM-000214
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-APP-000068-NDM-000215
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
<VulnDiscussion>Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notifi...Rule Low Severity -
SRG-APP-000080-NDM-000220
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to protect against an individual (or process acting on behalf of an individual) falsely denying having performed system configuration changes.
<VulnDiscussion>This requirement supports non-repudiation of actions taken by an administrator and is required in order to maintain the integ...Rule Medium Severity -
SRG-APP-000119-NDM-000236
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to protect audit information from unauthorized modification.
<VulnDiscussion>Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully au...Rule Medium Severity -
SRG-APP-000120-NDM-000237
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to protect audit information from unauthorized deletion.
<VulnDiscussion>Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully au...Rule Medium Severity -
SRG-APP-000121-NDM-000238
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to protect audit tools from unauthorized access.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity -
SRG-APP-000153-NDM-000249
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to ensure administrators are authenticated with an individual authenticator prior to using a group authenticator.
<VulnDiscussion>To assure individual accountability and prevent unauthorized access, administrators must be individually identified and authe...Rule Medium Severity -
SRG-APP-000164-NDM-000252
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to enforce a minimum 15-character password length.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-APP-000166-NDM-000254
<GroupDescription></GroupDescription>Group -
If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one upper-case character be used.
<VulnDiscussion>Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...Rule Medium Severity -
SRG-APP-000167-NDM-000255
<GroupDescription></GroupDescription>Group -
If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one lower-case character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000168-NDM-000256
<GroupDescription></GroupDescription>Group -
If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000169-NDM-000257
<GroupDescription></GroupDescription>Group -
If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000170-NDM-000329
<GroupDescription></GroupDescription>Group -
If multifactor authentication is not supported and passwords must be used, the BIG-IP appliance must require that when a password is changed, the characters are changed in at least eight (8) of the positions within the password.
<VulnDiscussion>If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...Rule Medium Severity -
SRG-APP-000171-NDM-000258
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must only store encrypted representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule Medium Severity -
SRG-APP-000172-NDM-000259
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must only transmit encrypted representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule Medium Severity -
SRG-APP-000178-NDM-000264
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
<VulnDiscussion>To prevent the compromise of authentication information such as passwords during the authentication process, the feedback fro...Rule Medium Severity -
SRG-APP-000179-NDM-000265
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
<VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...Rule Medium Severity -
SRG-APP-000186-NDM-000266
<GroupDescription></GroupDescription>Group -
The BIG-IP appliance must be configured to terminate all management sessions after 10 minutes of inactivity.
<VulnDiscussion>If a device management session or connection remains open after management is completed, it may be hijacked by an attacker an...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.