Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000113

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured to provide session (call detail) record generation capability.

    &lt;VulnDiscussion&gt;Session records are commonly produced by session management and border elements. Many Enterprise Voice, Video, and Messaging ...
    Rule Medium Severity
  • SRG-NET-000131

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured to disable or remove nonessential capabilities.

    &lt;VulnDiscussion&gt;It is detrimental for Enterprise Voice, Video, and Messaging Endpoints when unnecessary features are enabled by default. Ofte...
    Rule Medium Severity
  • SRG-NET-000132

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured to only use ports, protocols, and services allowed per the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and Vulnerability Assessments (VAs).

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule High Severity
  • SRG-NET-000138

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured to uniquely identify participating users.

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, users must be identified to prevent potential misuse and comprom...
    Rule High Severity
  • SRG-NET-000140

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must use multifactor authentication for network access to nonprivileged (nonadmin) accounts.

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, nonprivileged users must use multifactor authentication to preve...
    Rule Medium Severity
  • SRG-NET-000147

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured to implement replay-resistant authentication mechanisms for network access.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...
    Rule Medium Severity
  • SRG-NET-000213

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured to terminate all network connections associated with a communications session at the end of the session.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule High Severity
  • SRG-NET-000230

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured to use FIPS-validated SHA-2 or higher to protect the authenticity of communications sessions.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule Medium Severity
  • SRG-NET-000236

    <GroupDescription></GroupDescription>
    Group
  • In the event of a device failure, Enterprise Voice, Video, and Messaging Endpoints must preserve any information necessary to determine cause of failure and return to operations with least disruption to service.

    &lt;VulnDiscussion&gt;Failure in a known state can address safety or security in accordance with the mission needs of the organization. Failure to ...
    Rule Medium Severity
  • SRG-NET-000334

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must offload audit records onto a different system or media than the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules