Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-NDM-000336

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must employ RADIUS + LDAPS or LDAPS to centrally manage authentication settings.

    &lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services i...
    Rule Medium Severity
  • SRG-APP-000109-NDM-000233

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must shut down by default upon audit failure (unless availability is an overriding concern).

    &lt;VulnDiscussion&gt;It is critical that when the network device is at risk of failing to process audit logs as required, it take action to mitiga...
    Rule Medium Severity
  • SRG-APP-000125-NDM-000241

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must forward all log audit log messages to the central log server.

    &lt;VulnDiscussion&gt;Protection of log data includes assuring log data is not accidentally lost or deleted. Regularly backing up audit records to ...
    Rule Low Severity
  • SRG-APP-000080-NDM-000345

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must not have any default manufacturer passwords when deployed.

    &lt;VulnDiscussion&gt;Network devices not protected with strong password schemes provide the opportunity for anyone to crack the password and gain ...
    Rule Medium Severity
  • SRG-APP-000148-NDM-000346

    <GroupDescription></GroupDescription>
    Group
  • In the event the authentication server is unavailable, there must be one local account of last resort.

    &lt;VulnDiscussion&gt;Authentication for administrative (privileged-level) access to the device is required at all times. An account can be created...
    Rule Medium Severity
  • SRG-APP-000164-NDM-000252

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000170-NDM-000329

    <GroupDescription></GroupDescription>
    Group
  • If multifactor authentication is not supported and passwords must be used, the CA API Gateway must require that when a password is changed, the characters are changed in at least 8 of the positions within the password.

    &lt;VulnDiscussion&gt;If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...
    Rule Medium Severity
  • SRG-APP-000234-NDM-000272

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must automatically remove or disable emergency accounts, except the emergency administration account, after 72 hours.

    &lt;VulnDiscussion&gt;Emergency accounts are administrator accounts which are established in response to crisis situations where the need for rapid...
    Rule Medium Severity
  • SRG-APP-000268-NDM-000274

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.

    &lt;VulnDiscussion&gt;Predictable failure prevention requires organizational planning to address device failure issues. If components key to mainta...
    Rule Medium Severity
  • SRG-APP-000320-NDM-000284

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must notify System Administrators (SAs) and Information System Security Officers (ISSMs) when accounts are created, or enabled when previously disabled.

    &lt;VulnDiscussion&gt;Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestab...
    Rule Medium Severity
  • SRG-APP-000325-NDM-000285

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must transmit organization-defined access authorization information using organization-defined security safeguards to organization-defined information systems which enforce access control decisions.

    &lt;VulnDiscussion&gt;Protecting access authorization information (i.e., access control decisions) ensures that authorization information cannot be...
    Rule Medium Severity
  • SRG-APP-000373-NDM-000298

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.

    &lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...
    Rule Low Severity
  • SRG-APP-000374-NDM-000299

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Low Severity
  • SRG-APP-000375-NDM-000300

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.

    &lt;VulnDiscussion&gt;Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records....
    Rule Low Severity
  • SRG-APP-000377-NDM-000301

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must generate an alert that will then be sent to the ISSO, ISSM, and other designated personnel (deemed appropriate by the local organization) when the unauthorized installation of software is detected.

    &lt;VulnDiscussion&gt;Unauthorized software not only increases risk by increasing the number of potential vulnerabilities, it also can contain mali...
    Rule Medium Severity
  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must authenticate NTP endpoint devices before establishing a network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Low Severity
  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must authenticate SNMP endpoint devices before establishing a network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity
  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must authenticate RADIUS endpoint devices before establishing a network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity
  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must authenticate LDAPS endpoint devices before establishing a network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity
  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must obtain LDAPS server certificates securely to use bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity
  • SRG-APP-000435-NDM-000315

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must protect against or limit the effects of all known types of Denial of Service (DoS) attacks on the CA API Gateway management network by employing organization-defined security safeguards.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000503-NDM-000320

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must generate audit records when successful/unsuccessful logon attempts occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-APP-000505-NDM-000322

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must generate audit records showing starting and ending time for administrator access to the system.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-APP-000506-NDM-000323

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must generate audit records when concurrent logons from different workstations occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-APP-000515-NDM-000325

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must off-load audit records onto a different system or media than the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules