I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000132
<GroupDescription></GroupDescription>Group -
The Enterprise Voice, Video, and Messaging Session Manager must only use ports, protocols, and services allowed per the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and Vulnerability Assessments (VAs).
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule High Severity -
SRG-NET-000138
<GroupDescription></GroupDescription>Group -
The Enterprise Voice, Video, and Messaging Session Manager must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
<VulnDiscussion>To ensure accountability and prevent unauthenticated access, organizational users must be uniquely identified and authenticat...Rule High Severity -
SRG-NET-000138
<GroupDescription></GroupDescription>Group -
The Enterprise Voice, Video, and Messaging Session Manager must be configured to use an organizational-level user account management system.
<VulnDiscussion>To effectively manage user accounts, organizational level systems such as Lightweight Directory Access Protocol (LDAP) or Act...Rule High Severity -
SRG-NET-000147
<GroupDescription></GroupDescription>Group -
The Enterprise Voice, Video, and Messaging Session Manager must be configured to implement attack-resistant mechanisms for Voice Video Endpoint registration.
<VulnDiscussion>Attacks against an Enterprise Voice, Video, and Messaging Session Manager may include denial of service (DoS), replay attacks...Rule Medium Severity -
SRG-NET-000148
<GroupDescription></GroupDescription>Group -
The Enterprise Voice, Video, and Messaging Session Manager must be configured to uniquely identify each Voice Video Endpoint device before registration.
<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Typi...Rule Medium Severity -
SRG-NET-000213
<GroupDescription></GroupDescription>Group -
The Enterprise Voice, Video, and Messaging Session Manager must be configured to terminate all network connections associated with a communications session at the end of the session.
<VulnDiscussion>Terminating network connections associated with communications sessions includes, for example, de-allocating associated TCP/I...Rule Medium Severity -
SRG-NET-000225
<GroupDescription></GroupDescription>Group -
The Enterprise Voice, Video, and Messaging Session Manager supporting Command and Control (C2) communications must associate multilevel precedence and preemption (MLPP) attributes when exchanged between unified capabilities (UC) systems.
<VulnDiscussion>If MLPP attributes are not associated with the information being transmitted between systems, then access control policies an...Rule Medium Severity -
SRG-NET-000226
<GroupDescription></GroupDescription>Group -
The Enterprise Voice, Video, and Messaging Session Manager supporting Command and Control (C2) communications must validate the integrity of transmitted multilevel precedence and preemption (MLPP) attributes.
<VulnDiscussion>If MLPP attributes are not associated with the information being transmitted between components, then access control policies...Rule Medium Severity -
SRG-NET-000230
<GroupDescription></GroupDescription>Group -
The Enterprise Voice, Video, and Messaging Session Manager must be configured to use FIPS-validated SHA-2 or higher to protect the authenticity of communications sessions.
<VulnDiscussion>Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...Rule High Severity -
SRG-NET-000235
<GroupDescription></GroupDescription>Group -
The Enterprise Voice, Video, and Messaging Session Manager must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
<VulnDiscussion>Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized acces...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.