Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • The network element must protect wireless access to the system using Federal Information Processing Standard (FIPS)-validated Advanced Encryption Standard (AES) block cipher algorithms with an approved confidentiality mode.

    Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to a compromise or attack. Because wireless communications can be intercep...
    Rule Medium Severity
  • SRG-NET-000131

    Group
  • AOS must be configured to disable nonessential capabilities.

    It is detrimental for network elements to provide, or enable by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked ...
    Rule Medium Severity
  • SRG-NET-000193

    Group
  • AOS must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.

    A network element experiencing a DoS attack will not be able to handle production traffic load. The high utilization and CPU caused by a DoS attack will also have an effect on control keep-alives a...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules