Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-NDM-000200

    Group
  • The Juniper SRX Services Gateway must limit the number of concurrent sessions to a maximum of 10 or less for remote access using SSH.

    The connection-limit command limits the total number of concurrent SSH sessions. To help thwart brute force authentication attacks, the connection limit should be as restrictive as operationally pr...
    Rule Low Severity
  • SRG-APP-000026-NDM-000208

    Group
  • For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account creation events.

    Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. Notifica...
    Rule Medium Severity
  • SRG-APP-000027-NDM-000209

    Group
  • For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account modification events.

    Upon gaining access to a network device, an attacker will often first attempt to modify existing accounts to increase/decrease privileges. Notification of account modification events help to mitiga...
    Rule Medium Severity
  • SRG-APP-000028-NDM-000210

    Group
  • For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account disabling events.

    When device management accounts are disabled, user or service accessibility may be affected. Auditing also ensures authorized, active accounts remain enabled and available for use when required. Wi...
    Rule Medium Severity
  • SRG-APP-000029-NDM-000211

    Group
  • For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account removal events.

    Auditing account removal actions will support account management procedures. When device management accounts are terminated, user or service accessibility may be affected. Auditing also ensures aut...
    Rule Medium Severity
  • SRG-APP-000319-NDM-000283

    Group
  • The Juniper SRX Services Gateway must automatically generate a log event when accounts are enabled.

    Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply...
    Rule Medium Severity
  • SRG-APP-000033-NDM-000212

    Group
  • The Juniper SRX Services Gateway must enforce the assigned privilege level for each administrator and authorizations for access to all commands by assigning a login class to all AAA-authenticated users.

    To mitigate the risk of unauthorized privileged access to the device, administrators must be assigned only the privileges needed to perform the tasked assigned to their roles. Although use of an ...
    Rule Medium Severity
  • SRG-APP-000343-NDM-000289

    Group
  • The Juniper SRX Services Gateway must generate a log event when privileged commands are executed.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Low Severity
  • SRG-APP-000065-NDM-000214

    Group
  • For local accounts created on the device, the Juniper SRX Services Gateway must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Juniper SRX is unable to comply wi...
    Rule Low Severity
  • SRG-APP-000068-NDM-000215

    Group
  • The Juniper SRX Services Gateway must display the Standard Mandatory DoD Notice and Consent Banner before granting access.

    Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executi...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules