Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000364

    Group
  • The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.

    These options are intended to be for the Destination Options header only. The optional and extensible natures of the IPv6 extension headers require higher scrutiny since many implementations do not...
    Rule Medium Severity
  • SRG-NET-000364

    Group
  • The perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.

    These options are intended to be for the Hop-by-Hop header only. The optional and extensible natures of the IPv6 extension headers require higher scrutiny since many implementations do not always d...
    Rule Medium Severity
  • SRG-NET-000364

    Group
  • The perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option.

    The optional and extensible natures of the IPv6 extension headers require higher scrutiny since many implementations do not always drop packets with headers that it cannot recognize, and hence coul...
    Rule Medium Severity
  • SRG-NET-000364

    Group
  • The perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.

    The optional and extensible natures of the IPv6 extension headers require higher scrutiny since many implementations do not always drop packets with headers that it cannot recognize, and hence coul...
    Rule Medium Severity
  • SRG-NET-000364

    Group
  • The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type.

    The optional and extensible natures of the IPv6 extension headers require higher scrutiny since many implementations do not always drop packets with headers that it cannot recognize, and hence coul...
    Rule Medium Severity
  • SRG-NET-000705

    Group
  • The router must employ organization-defined controls by type of denial of service (DoS) to achieve the DoS objective.

    DoS events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of planning to support organizational needs with respect to capacity and bandwidth...
    Rule Medium Severity
  • SRG-NET-000715

    Group
  • The router must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.

    Separating critical system components and functions from other noncritical system components and functions through separate subnetworks may be necessary to reduce susceptibility to a catastrophic o...
    Rule Medium Severity
  • SRG-NET-000760

    Group
  • The router must establish organization-defined alternate communications paths for system operations organizational command and control.

    An incident, whether adversarial- or nonadversarial-based, can disrupt established communications paths used for system operations and organizational command and control. Alternate communications p...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules