Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000023-NDM-000205

    Group
  • The DBN-6300 must provide automated support for account management functions.

    If account management functions are not automatically enforced, an attacker could gain privileged access to a vital element of the network security architecture.
    Rule High Severity
  • SRG-APP-000026-NDM-000208

    Group
  • The DBN-6300 must automatically audit account creation.

    Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. This con...
    Rule Medium Severity
  • SRG-APP-000027-NDM-000209

    Group
  • The DBN-6300 must automatically audit account modification.

    Upon gaining access to a network device, an attacker will often attempt to create a persistent method of reestablishing access. One way to accomplish this is to modify an account. This control does...
    Rule Medium Severity
  • SRG-APP-000325-NDM-000285

    Group
  • The DBN-6300 must be compliant with at least one IETF Internet standard authentication protocol.

    Protecting access authorization information (i.e., access control decisions) ensures that authorization information cannot be altered, spoofed, or otherwise compromised during transmission. In dis...
    Rule Medium Severity
  • SRG-APP-000029-NDM-000211

    Group
  • The DBN-6300 must automatically audit account removal actions.

    Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will su...
    Rule Medium Severity
  • SRG-APP-000065-NDM-000214

    Group
  • The DBN-6300 must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. It is possible to set a time-to-re...
    Rule Medium Severity
  • SRG-APP-000080-NDM-000220

    Group
  • The DBN-6300 must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.

    This requirement supports non-repudiation of actions taken by an administrator and is required in order to maintain the integrity of the configuration management process. All configuration changes ...
    Rule Low Severity
  • SRG-APP-000516-NDM-000334

    Group
  • The DBN-6300 must generate audit log events for a locally developed list of auditable events.

    Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity...
    Rule Medium Severity
  • SRG-APP-000089-NDM-000221

    Group
  • The DBN-6300 must provide audit record generation capability for DoD-defined auditable events within the DBN-6300.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit re...
    Rule Medium Severity
  • SRG-APP-000090-NDM-000222

    Group
  • The DBN-6300 must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the audit log.

    Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules