III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000504-NDM-000321
Group -
The DBN-6300 must generate audit records for privileged activities or other system-level access.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-APP-000505-NDM-000322
Group -
The DBN-6300 must generate audit records showing starting and ending time for administrator access to the system.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-APP-000506-NDM-000323
Group -
The DBN-6300 must generate audit records when concurrent logons from different workstations occur.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-APP-000509-NDM-000324
Group -
The DBN-6300 must generate audit records for all account creation, modification, disabling, and termination events.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-APP-000515-NDM-000325
Group -
The DBN-6300 must off-load audit records onto a different system or media than the system being audited.
Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also protects the audit record in case the system/component being audited is comp...Rule Medium Severity -
SRG-APP-000516-NDM-000317
Group -
The DBN-6300 must be configured to send log data to a syslog server for the purpose of forwarding alerts to the administrators and the ISSO.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to create...Rule High Severity -
SRG-APP-000516-NDM-000336
Group -
Accounts for device management must be configured on the authentication server and not the network device itself, except for the account of last resort.
Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With r...Rule Medium Severity -
SRG-APP-000516-NDM-000344
Group -
The DBN-6300 must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.