Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The SDN controller must be configured to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Providing too much information in error messages on the screen or printout risks compromising the data and security of the SD...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The SDN controller must be configured to notify the ISSO and ISSM of failed verification tests for organization-defined security functions.

    &lt;VulnDiscussion&gt;If personnel are not notified of failed security verification tests, they will not be able to take corrective action and the ...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The SDN controller must be configured to prohibit user installation of software without explicit privileged status.

    &lt;VulnDiscussion&gt;Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The SDN controller must be configured to enforce access restrictions associated with changes to the configuration.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to application configuration may have significant effe...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The SDN controller must be configured to audit the enforcement actions used to restrict access associated with changes to any application within the SDN framework.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to any application within the SDN framework, it will ...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The SDN controller must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuring the network device to implement organization-wide security implementation guides and security checklists ensures ...
    Rule Medium Severity
  • SRG-NET-000705

    <GroupDescription></GroupDescription>
    Group
  • The SDN controller must be configured to employ organization-defined controls by type of denial of service (DoS) to achieve the DoS objective.

    &lt;VulnDiscussion&gt;DoS events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of plannin...
    Rule Medium Severity
  • SRG-NET-000715

    <GroupDescription></GroupDescription>
    Group
  • The SDN controller must be configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.

    &lt;VulnDiscussion&gt;Separating critical system components and functions from other noncritical system components and functions through separate s...
    Rule Medium Severity
  • SRG-NET-000760

    <GroupDescription></GroupDescription>
    Group
  • The SDN controller must be configured to establish organization-defined alternate communications paths for system operations organizational command and control.

    &lt;VulnDiscussion&gt;An incident, whether adversarial- or nonadversarial-based, can disrupt established communications paths used for system opera...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules