Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000352

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured to use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. NIST cryptographi...
    Rule Medium Severity
  • SRG-NET-000353

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must provide an explicit indication of current participants in all Videoconference (VC)-based and IP-based online meetings and conferences.

    &lt;VulnDiscussion&gt;Providing an explicit indication of current participants in teleconferences helps to prevent unauthorized individuals from pa...
    Rule Medium Severity
  • SRG-NET-000371

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured to use FIPS-compliant algorithms for network traffic.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised as unprotected communicat...
    Rule High Severity
  • SRG-NET-000400

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint, when using passwords or PINs for authentication or authorization, must be configured to cryptographically protect the PIN or password.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times and encryption is the standard method for protecting passwords. If passwords are ...
    Rule High Severity
  • SRG-NET-000503

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must generate audit records when successful/unsuccessful logon attempts occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-NET-000504

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must generate audit records for privileged activities or other system-level access.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-NET-000505

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must generate audit records showing starting and ending time for user access to the system.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-NET-000511

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must, at a minimum, offload interconnected systems in real-time and offload standalone systems weekly.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuring the network element to implement organization-wide security implementation guides and security checklists ensures...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The Enterprise Voice, Video, and Messaging Endpoint must be configured with a firmware release supported by the vendor.

    &lt;VulnDiscussion&gt;Operating a device with outdated firmware may leave the device with unmitigated security vulnerabilities. Vendors routinely u...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules