Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000027-NDM-000209

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must configure logging levels for services to ensure audit records are generated.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-APP-000033-NDM-000212

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.

    &lt;VulnDiscussion&gt;The lack of authorization-based access control could result in the immediate compromise and unauthorized access to sensitive ...
    Rule High Severity
  • SRG-APP-000065-NDM-000214

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must display the Standard Mandatory DOD Notice and Consent Banner before granting access.

    &lt;VulnDiscussion&gt;Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notifi...
    Rule Medium Severity
  • SRG-APP-000069-NDM-000216

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must retain the Standard Mandatory DOD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.

    &lt;VulnDiscussion&gt;The banner must be acknowledged by the administrator prior to the device allowing the administrator access to the network dev...
    Rule Medium Severity
  • SRG-APP-000080-NDM-000220

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must be configured to integrate with an identity provider that supports multifactor authentication (MFA).

    &lt;VulnDiscussion&gt;Common attacks against single-factor authentication are attacks on user passwords. These attacks include brute force password...
    Rule High Severity
  • SRG-APP-000148-NDM-000346

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.

    &lt;VulnDiscussion&gt;Authentication for administrative (privileged level) access to the device is required at all times. An account can be created...
    Rule Medium Severity
  • SRG-APP-000156-NDM-000250

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must only enable TLS 1.2 or greater.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...
    Rule High Severity
  • SRG-APP-000164-NDM-000252

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must enforce a minimum 15-character password length for local accounts.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000166-NDM-000254

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must enforce password complexity by requiring that at least one uppercase character be used for local accounts.

    &lt;VulnDiscussion&gt;Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...
    Rule Medium Severity
  • SRG-APP-000167-NDM-000255

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must enforce password complexity by requiring that at least one lowercase character be used for local accounts.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000168-NDM-000256

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must enforce password complexity by requiring that at least one numeric character be used for local accounts.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000169-NDM-000257

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must enforce password complexity by requiring that at least one special character be used for local accounts.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000170-NDM-000329

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must require that when a password is changed, the characters are changed in at least eight of the positions within the password.

    &lt;VulnDiscussion&gt;If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...
    Rule Medium Severity
  • SRG-APP-000190-NDM-000267

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must terminate all network connections associated with a session after five minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take i...
    Rule High Severity
  • SRG-APP-000373-NDM-000298

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must be configured to synchronize internal information system clocks using redundant authoritative time sources.

    &lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...
    Rule Medium Severity
  • SRG-APP-000374-NDM-000299

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Medium Severity
  • SRG-APP-000435-NDM-000315

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must be configured to protect against denial-of-service (DoS) attacks by limit the number of concurrent sessions to an organization-defined number.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000515-NDM-000325

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must be configured to send logs to a central log server.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule High Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must not provide environment information to third parties.

    &lt;VulnDiscussion&gt;Providing technical details about an environment's infrastructure to third parties could unknowingly expose sensitive informa...
    Rule Info Severity
  • SRG-APP-000516-NDM-000341

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must be configured to conduct backups on an organizationally defined schedule.

    &lt;VulnDiscussion&gt;Information system backup is a critical step in maintaining data assurance and availability. Information system and security-...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

    &lt;VulnDiscussion&gt;For user certificates, each organization obtains certificates from an approved, shared service provider, as required by Offic...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000351

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must be running a release that is currently supported by the vendor.

    &lt;VulnDiscussion&gt;Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated...
    Rule High Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must disable SSH.

    &lt;VulnDiscussion&gt;The NSX shell provides temporary access to commands essential for server maintenance. Intended primarily for use in break-fix...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The NSX Manager must disable SNMP v2.

    &lt;VulnDiscussion&gt;SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous ver...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules