Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000336-NAC-001390

    <GroupDescription></GroupDescription>
    Group
  • Forescout must be configured with a secondary log server, in case the primary log is unreachable. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-NET-000512-NAC-002310

    <GroupDescription></GroupDescription>
    Group
  • Forescout must perform continuous detection and tracking of endpoint devices attached to the network. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Continuous scanning capabilities on the NAC provide visibility of devices that are connected to the switch ports. The NAC con...
    Rule Medium Severity
  • SRG-NET-000148-NAC-000620

    <GroupDescription></GroupDescription>
    Group
  • Forescout must deny network connection for endpoints that cannot be authenticated using an approved method. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Iden...
    Rule Medium Severity
  • SRG-NET-000151-NAC-000630

    <GroupDescription></GroupDescription>
    Group
  • Forescout must use a bidirectional authentication mechanism configured with a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the endpoint device. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are ...
    Rule Medium Severity
  • SRG-NET-000580-NAC-002530

    <GroupDescription></GroupDescription>
    Group
  • When connecting with endpoints, Forescout must be configured to use FIPS 140-2/3 validated algorithms for encryption processes and communications. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules