Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000002

    Group
  • The network device must conceal, via the session lock, information previously visible on the display with a publicly viewable image.

    A session lock is a temporary network device or administrator-initiated action taken when the administrator stops work but does not log out of the network device. The network management session lo...
    Rule Medium Severity
  • SRG-APP-000003

    Group
  • The network device must initiate a session lock after a 15-minute period of inactivity.

    A session lock is a temporary network device or administrator-initiated action taken when the administrator stops work but does not log out of the network device. Rather than relying on the user t...
    Rule Medium Severity
  • SRG-APP-000004

    Group
  • The network device must be configured to enable network administrators to directly initiate a session lock.

    A session lock is a temporary network device or administrator-initiated action taken when the administrator stops work but does not log out of the network device. Rather than being forced to wait f...
    Rule Medium Severity
  • SRG-APP-000005

    Group
  • The network device must retain the session lock until the administrator reestablishes access using established identification and authentication procedures.

    A session lock is a temporary network device or administrator-initiated action taken when the administrator stops work but does not log out of the network device. Once invoked, the session lock sh...
    Rule Medium Severity
  • SRG-APP-000026

    Group
  • The network device must automatically audit account creation.

    Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. Notifica...
    Rule Medium Severity
  • SRG-APP-000027

    Group
  • The network device must automatically audit account modification.

    Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security of the network device. Account management by a designated authority ens...
    Rule Medium Severity
  • SRG-APP-000028

    Group
  • The network device must automatically audit account disabling actions.

    Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account disabling actions will ...
    Rule Medium Severity
  • SRG-APP-000029

    Group
  • The network device must automatically audit account removal actions.

    Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will su...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • The network device must be configured to assign appropriate user roles or access levels to authenticated users.

    Successful identification and authentication must not automatically give an entity full access to a network device or security domain. The lack of authorization-based access control could result in...
    Rule High Severity
  • SRG-APP-000038

    Group
  • The network device must enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.

    A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design. If management information flow is not enforced based on approved autho...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules