Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-NDM-000200

    Group
  • Sentry must limit the number of concurrent sessions for the CLISH interface to an organization-defined number for each administrator account and/or administrator account type.

    Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administr...
    Rule Medium Severity
  • SRG-APP-000001-NDM-000200

    Group
  • Sentry must be configured to limit the network access of the Sentry System Manager Portal behind the corporate firewall and whitelist source IP range.

    Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administr...
    Rule Medium Severity
  • SRG-APP-000003-NDM-000202

    Group
  • Sentry must initiate a session lock after a 15-minute period of inactivity.

    A session lock is a temporary network device or administrator-initiated action taken when the administrator stops work but does not log out of the network device. Rather than relying on the user to...
    Rule Medium Severity
  • SRG-APP-000038-NDM-000213

    Group
  • Sentry must enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.

    A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design. If management information flow is not enforced based on approved autho...
    Rule Low Severity
  • SRG-APP-000065-NDM-000214

    Group
  • Sentry must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules