Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-NDM-000200

    Group
  • Forescout must limit the number of concurrent sessions to one for each administrator account.

    Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administr...
    Rule Low Severity
  • SRG-APP-000317-NDM-000282

    Group
  • Forescout must terminate the account of last resort password when members with access to the password leave the group.

    A shared/group account credential is a shared form of authentication that allows multiple individuals to access the network device using a single account. If shared/group account credentials are no...
    Rule Medium Severity
  • SRG-APP-000148-NDM-000346

    Group
  • Forescout must be configured with only one web account and one CLI account of last resort with limited access and used only when the authentication server is unavailable.

    Authentication for administrative (privileged-level) access to the device is required at all times. An account can be created on the device's local database for use when the authentication server i...
    Rule Medium Severity
  • SRG-APP-000065-NDM-000214

    Group
  • Forescout must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    Group
  • Forescout must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.

    Display of the DoD-approved use notification before granting access to the application ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive ...
    Rule Low Severity
  • SRG-APP-000069-NDM-000216

    Group
  • Forescout must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.

    The banner must be acknowledged by the administrator prior to the device allowing the administrator access to the network device. This provides assurance that the administrator has seen the message...
    Rule Low Severity
  • SRG-APP-000091-NDM-000223

    Group
  • Forescout must generate log records when successful attempts to access privileges occur.

    Without generating log records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or i...
    Rule Low Severity
  • SRG-APP-000495-NDM-000318

    Group
  • Forescout must generate log records when attempts to modify administrator privileges occur.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000499-NDM-000319

    Group
  • Forescout must generate log records when attempts to delete administrator privileges occur.

    Without generating log records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or i...
    Rule Low Severity
  • SRG-APP-000503-NDM-000320

    Group
  • Forescout must generate log records showing when successful logon attempts occur.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000504-NDM-000321

    Group
  • Forescout must generate log records for privileged activities or other system-level access.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000505-NDM-000322

    Group
  • Forescout must generate log records showing starting and ending time for administrator access to the system.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000506-NDM-000323

    Group
  • Forescout must generate log records when concurrent logons from different workstations occur.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000515-NDM-000325

    Group
  • The Forescout must configure a remote syslog where audit records are stored on a centralized logging target that is different from the system being audited.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    Rule Low Severity
  • SRG-APP-000373-NDM-000298

    Group
  • Forescout must be configured to synchronize internal information system clocks using redundant authoritative time sources.

    The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other ...
    Rule Medium Severity
  • SRG-APP-000374-NDM-000299

    Group
  • Forescout must be configured to use Coordinated Universal Time (UTC).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Tim...
    Rule Medium Severity
  • SRG-APP-000378-NDM-000302

    Group
  • Forescout must prohibit installation of software without explicit privileged permission by only authorized individuals.

    Allowing anyone to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. This requirement applies to code ...
    Rule Medium Severity
  • SRG-APP-000380-NDM-000304

    Group
  • Forescout must enforce access restrictions associated with changes to device configuration.

    Failure to provide logical access restrictions associated with changes to device configuration may have significant effects on the overall security of the system. For Forescout, ensure only autho...
    Rule Medium Severity
  • SRG-APP-000381-NDM-000305

    Group
  • Forescout must audit the enforcement actions used to restrict access associated with changes to the device.

    Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to identify attempted attacks, and an audit trail will not be available for...
    Rule Low Severity
  • SRG-APP-000131-NDM-000243

    Group
  • Forescout must prevent the installation of patches, service packs, plug-ins, or modules without verification the update has been digitally signed using a certificate that is recognized and approved by the organization.

    Changes to any software components can have significant effects on the overall security of the network device. Verifying software components have been digitally signed using a certificate that is r...
    Rule Low Severity
  • SRG-APP-000133-NDM-000244

    Group
  • Forescout must limit privileges to change the modules and OSs resident within software libraries.

    Changes to any software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals must be allowed ad...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000335

    Group
  • Forescout must enforce access restrictions associated with changes to the firmware, OS, USB port, and console port.

    Changes to the hardware or software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals must b...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000336

    Group
  • Forescout must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.

    Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With ro...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000351

    Group
  • Forescout must be running an operating system release that is currently supported by the vendor.

    Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities. In Oct 2021, there is plan to make Versio...
    Rule Medium Severity
  • SRG-APP-000329-NDM-000287

    Group
  • If the network device uses role-based access control, Forescout must enforce organization-defined, role-based access control policies over defined subjects and objects.

    Organizations can create specific roles based on job functions and the authorizations (i.e., privileges) to perform needed operations on organizational information systems associated with the organ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules