No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000502
<GroupDescription></GroupDescription>Group -
The ALG must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-NET-000503
<GroupDescription></GroupDescription>Group -
The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-NET-000505
<GroupDescription></GroupDescription>Group -
The ALG providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-NET-000510
<GroupDescription></GroupDescription>Group -
The ALG providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...Rule Medium Severity -
SRG-NET-000510
<GroupDescription></GroupDescription>Group -
The ALG providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...Rule Medium Severity -
SRG-NET-000510
<GroupDescription></GroupDescription>Group -
The ALG providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...Rule Medium Severity -
SRG-NET-000511
<GroupDescription></GroupDescription>Group -
The ALG must off-load audit records onto a centralized log server in real time.
<VulnDiscussion>Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also prot...Rule Medium Severity -
SRG-NET-000511
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS must have the capability to implement journaling.
<VulnDiscussion>A journaling file system is a file system that keeps track of the changes that will be made in a journal (usually a circular ...Rule Medium Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The ALG must be configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices.
<VulnDiscussion>Configuring the network element to implement organization-wide security implementation guides and security checklists ensures...Rule Medium Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The ALG that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as SMTP to identify attacks based on observe...Rule Medium Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The ALG that intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as FTP to identify attacks based on observed...Rule Medium Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The ALG that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as HTTP to identify attacks based on observe...Rule Medium Severity -
SRG-NET-000513
<GroupDescription></GroupDescription>Group -
The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to access privileges occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-NET-000514
<GroupDescription></GroupDescription>Group -
The ALG providing user access control intermediary services must initiate a session lock after a 15-minute period of inactivity.
<VulnDiscussion>A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...Rule Medium Severity -
SRG-NET-000515
<GroupDescription></GroupDescription>Group -
The ALG providing user access control intermediary services must provide the capability for users to directly initiate a session lock.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity -
SRG-NET-000516
<GroupDescription></GroupDescription>Group -
The ALG providing user access control intermediary services must retain the session lock until the user reestablishes access using established identification and authentication procedures.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity -
SRG-NET-000517
<GroupDescription></GroupDescription>Group -
The ALG providing user access control intermediary services must automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-NET-000518
<GroupDescription></GroupDescription>Group -
The ALG providing user access control intermediary services must provide a logoff capability for user-initiated communications sessions.
<VulnDiscussion>If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker. However, for some ty...Rule Medium Severity -
SRG-NET-000519
<GroupDescription></GroupDescription>Group -
The ALG providing user access control intermediary services must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.
<VulnDiscussion>If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...Rule Medium Severity -
SRG-NET-000521
<GroupDescription></GroupDescription>Group -
The ALG providing user access control intermediary services must conceal, via the session lock, information previously visible on the display with a publicly viewable image.
<VulnDiscussion>A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...Rule Medium Severity -
SRG-NET-000700
<GroupDescription></GroupDescription>Group -
The ALG must prevent or restrict changes to the configuration of the system under organization-defined circumstances.
<VulnDiscussion>System configuration changes can adversely affect critical system security and privacy functionality. Change restrictions can...Rule Medium Severity -
SRG-NET-000705
<GroupDescription></GroupDescription>Group -
The ALG must employ organization-defined controls by type of denial of service (DoS) to achieve the DoS objective.
<VulnDiscussion>DoS events can occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of plannin...Rule Medium Severity -
SRG-NET-000715
<GroupDescription></GroupDescription>Group -
The ALG must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
<VulnDiscussion>Separating critical system components and functions from other noncritical system components and functions through separate s...Rule Medium Severity -
SRG-NET-000735
<GroupDescription></GroupDescription>Group -
The ALG must implement antispoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process.
<VulnDiscussion>Some attack vectors operate by altering the security attributes of an information system to intentionally and maliciously imp...Rule Medium Severity -
SRG-NET-000750
<GroupDescription></GroupDescription>Group -
The ALG must include only approved trust anchors in trust stores or certificate stores managed by the organization.
<VulnDiscussion>Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certific...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.