Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000321-NAC-001210

    Group
  • Forescout must enforce the revocation of endpoint access authorizations when devices are removed from an authorization group. This is required for compliance with C2C Step 4.

    Ensuring the conditions that are configured in policy have proper time limits set to reflect changes will allow for proper access. This will help to validate that authorized individuals have proper...
    Rule Medium Severity
  • SRG-NET-000322-NAC-001220

    Group
  • Forescout must enforce the revocation of endpoint access authorizations at the next compliance assessment interval based on changes to the compliance assessment security policy. This is required for compliance with C2C Step 4.

    This requirement gives the option to configure for automated remediation and/or manual remediation. A detailed record must be passed to the remediation server for action. Alternatively, the details...
    Rule Medium Severity
  • SRG-NET-000322-NAC-001230

    Group
  • Forescout must deny or restrict access for endpoints that fail critical endpoint security checks. This is required for compliance with C2C Step 4.

    Devices that do not meet minimum-security configuration requirements pose a risk to the DOD network and information assets. Endpoint devices must be disconnected or given limited access as designa...
    Rule Medium Severity
  • SRG-NET-000334-NAC-001350

    Group
  • Forescout must off-load log records onto a different system. This is required for compliance with C2C Step 1.

    Having a separate, secure location for log records is essential to the preservation of logs as required by policy.
    Rule Medium Severity
  • SRG-NET-000335-NAC-001360

    Group
  • Forescout must generate a critical alert to be sent to the Information System Security Officer (ISSO) and Systems Administrator (SA) (at a minimum) in the event of an audit processing failure. This is required for compliance with C2C Step 1.

    Ensuring that a security solution alerts in the event of misconfiguration or error is imperative to ensuring that proper auditing is being conducted. Having the ability to immediately notify an adm...
    Rule Medium Severity
  • SRG-NET-000343-NAC-001460

    Group
  • Forescout must authenticate all endpoint devices before establishing a connection and proceeding with posture assessment. This is required for compliance with C2C Step 4.

    Authenticating all devices as they connect to the network is the baseline of a good security solution. This is especially important prior to posture assessment to ensure authorized devices are onli...
    Rule Medium Severity
  • SRG-NET-000343-NAC-001470

    Group
  • Forescout must be configured to apply dynamic ACLs that restrict the use of ports when non-entity endpoints are connected using MAC Authentication Bypass (MAB). This is required for compliance with C2C Step 4.

    MAB is only one way of connecting non-entity endpoints, and can be defeated by spoofing the MAC address of an assumed authorized device. By adding the device to the MAR, the device can then gain ac...
    Rule Medium Severity
  • SRG-NET-000273-NAC-000970

    Group
  • Forescout must reveal error messages only to the Information System Security Officer (ISSO), Information System Security Manager (ISSM), and System Administrator (SA). This is required for compliance with C2C Step 1.

    Ensuring the proper amount of information is provided to the Security Management staff is imperative to ensure role based access control. Only those individuals that need to know about a security e...
    Rule Medium Severity
  • SRG-NET-000088-NAC-000440

    Group
  • Forescout must configure TCP for the syslog protocol to allow for detection by the central event server if communications is lost. This is required for compliance with C2C Step 1.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...
    Rule Medium Severity
  • SRG-NET-000343-NAC-001480

    Group
  • Forescout switch module must only allow a maximum of one registered MAC address per access port. This is required for compliance with C2C Step 4.

    Limiting the number of registered MAC addresses on a switch access port can help prevent a CAM table overflow attack. This type of attack lets an attacker exploit the hardware and memory limitation...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules