III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000023-NDM-000205
Group -
The DBN-6300 must provide automated support for account management functions.
If account management functions are not automatically enforced, an attacker could gain privileged access to a vital element of the network security architecture.Rule High Severity -
SRG-APP-000026-NDM-000208
Group -
The DBN-6300 must automatically audit account creation.
Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. This con...Rule Medium Severity -
SRG-APP-000027-NDM-000209
Group -
The DBN-6300 must automatically audit account modification.
Upon gaining access to a network device, an attacker will often attempt to create a persistent method of reestablishing access. One way to accomplish this is to modify an account. This control does...Rule Medium Severity -
SRG-APP-000325-NDM-000285
Group -
The DBN-6300 must be compliant with at least one IETF Internet standard authentication protocol.
Protecting access authorization information (i.e., access control decisions) ensures that authorization information cannot be altered, spoofed, or otherwise compromised during transmission. In dis...Rule Medium Severity -
SRG-APP-000029-NDM-000211
Group -
The DBN-6300 must automatically audit account removal actions.
Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will su...Rule Medium Severity -
SRG-APP-000065-NDM-000214
Group -
The DBN-6300 must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. It is possible to set a time-to-re...Rule Medium Severity -
SRG-APP-000080-NDM-000220
Group -
The DBN-6300 must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
This requirement supports non-repudiation of actions taken by an administrator and is required in order to maintain the integrity of the configuration management process. All configuration changes ...Rule Low Severity -
SRG-APP-000516-NDM-000334
Group -
The DBN-6300 must generate audit log events for a locally developed list of auditable events.
Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity...Rule Medium Severity -
SRG-APP-000089-NDM-000221
Group -
The DBN-6300 must provide audit record generation capability for DoD-defined auditable events within the DBN-6300.
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit re...Rule Medium Severity -
SRG-APP-000090-NDM-000222
Group -
The DBN-6300 must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the audit log.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Low Severity -
SRG-APP-000091-NDM-000223
Group -
The DBN-6300 must generate log records when successful attempts to access privileges occur.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-APP-000092-NDM-000224
Group -
The DBN-6300 must initiate session auditing upon startup.
If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enabl...Rule Low Severity -
SRG-APP-000095-NDM-000225
Group -
The DBN-6300 must produce audit log records containing sufficient information to establish what type of event occurred.
It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done in order to compile an accurate risk assessment. ...Rule Low Severity -
SRG-APP-000096-NDM-000226
Group -
The DBN-6300 must produce audit records containing information to establish when (date and time) the events occurred.
It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done in order to compile an accurate risk assessment. ...Rule Low Severity -
SRG-APP-000097-NDM-000227
Group -
The DBN-6300 must produce audit records containing information to establish where the events occurred.
In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as device hardware components, device softw...Rule Low Severity -
SRG-APP-000098-NDM-000228
Group -
The DBN-6300 must produce audit log records containing information to establish the source of events.
In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know the source of the event. The source may be a component, module, or proc...Rule Low Severity -
SRG-APP-000099-NDM-000229
Group -
The DBN-6300 must produce audit records that contain information to establish the outcome of the event.
Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the sy...Rule Low Severity -
SRG-APP-000100-NDM-000230
Group -
The DBN-6300 must generate audit records containing information that establishes the identity of any individual or process associated with the event.
Without information that establishes the identity of the subjects (i.e., administrators or processes acting on behalf of administrators) associated with the events, security personnel cannot determ...Rule Low Severity -
SRG-APP-000101-NDM-000231
Group -
The DBN-6300 must generate audit records containing the full-text recording of privileged commands.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Organizations consider limiting the additional audit information to only t...Rule Low Severity -
SRG-APP-000116-NDM-000234
Group -
The DBN-6300 must use internal system clocks to generate time stamps for audit records.
In order to determine what is happening within the network infrastructure or to resolve and trace an attack, the network device must support the organization's capability to correlate the audit log...Rule Medium Severity -
SRG-APP-000125-NDM-000241
Group -
The DBN-6300 must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
Protection of log data includes assuring log data is not accidentally lost or deleted. Regularly backing up audit records to a different system or onto separate media than the system being audited ...Rule Low Severity -
SRG-APP-000148-NDM-000346
Group -
The DBN-6300 must uniquely identify and authenticate organizational administrators (or processes acting on behalf of organizational administrators).
To ensure accountability and prevent unauthenticated access, organizational administrators must be uniquely identified and authenticated for all network management accesses to prevent potential mis...Rule High Severity -
SRG-APP-000149-NDM-000247
Group -
The DBN-6300 must use multifactor authentication for network access (remote and nonlocal) to privileged accounts.
Multifactor authentication requires using two or more factors to achieve authentication. Factors include: (i) something a user knows (e.g., password/PIN); (ii) something a user has (e.g., crypto...Rule Medium Severity -
SRG-APP-000151-NDM-000248
Group -
The DBN-6300 must use multifactor authentication for local access to privileged accounts.
Multifactor authentication is defined as using two or more factors to achieve authentication. Factors include: (i) Something a user knows (e.g., password/PIN); (ii) Something a user has (e.g., c...Rule Medium Severity -
SRG-APP-000156-NDM-000250
Group -
The DBN-6300 must implement replay-resistant authentication mechanisms for network access to privileged accounts.
A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.