III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000023-NDM-000205
<GroupDescription></GroupDescription>Group -
The DBN-6300 must provide automated support for account management functions.
<VulnDiscussion>If account management functions are not automatically enforced, an attacker could gain privileged access to a vital element o...Rule High Severity -
SRG-APP-000026-NDM-000208
<GroupDescription></GroupDescription>Group -
The DBN-6300 must automatically audit account creation.
<VulnDiscussion>Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing...Rule Medium Severity -
SRG-APP-000027-NDM-000209
<GroupDescription></GroupDescription>Group -
The DBN-6300 must automatically audit account modification.
<VulnDiscussion>Upon gaining access to a network device, an attacker will often attempt to create a persistent method of reestablishing acces...Rule Medium Severity -
SRG-APP-000325-NDM-000285
<GroupDescription></GroupDescription>Group -
The DBN-6300 must be compliant with at least one IETF Internet standard authentication protocol.
<VulnDiscussion>Protecting access authorization information (i.e., access control decisions) ensures that authorization information cannot be...Rule Medium Severity -
SRG-APP-000029-NDM-000211
<GroupDescription></GroupDescription>Group -
The DBN-6300 must automatically audit account removal actions.
<VulnDiscussion>Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting acces...Rule Medium Severity -
SRG-APP-000065-NDM-000214
<GroupDescription></GroupDescription>Group -
The DBN-6300 must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-APP-000080-NDM-000220
<GroupDescription></GroupDescription>Group -
The DBN-6300 must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
<VulnDiscussion>This requirement supports non-repudiation of actions taken by an administrator and is required in order to maintain the integ...Rule Low Severity -
SRG-APP-000516-NDM-000334
<GroupDescription></GroupDescription>Group -
The DBN-6300 must generate audit log events for a locally developed list of auditable events.
<VulnDiscussion>Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means...Rule Medium Severity -
SRG-APP-000089-NDM-000221
<GroupDescription></GroupDescription>Group -
The DBN-6300 must provide audit record generation capability for DoD-defined auditable events within the DBN-6300.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-APP-000090-NDM-000222
<GroupDescription></GroupDescription>Group -
The DBN-6300 must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the audit log.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Low Severity -
SRG-APP-000091-NDM-000223
<GroupDescription></GroupDescription>Group -
The DBN-6300 must generate log records when successful attempts to access privileges occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000092-NDM-000224
<GroupDescription></GroupDescription>Group -
The DBN-6300 must initiate session auditing upon startup.
<VulnDiscussion>If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit sys...Rule Low Severity -
SRG-APP-000095-NDM-000225
<GroupDescription></GroupDescription>Group -
The DBN-6300 must produce audit log records containing sufficient information to establish what type of event occurred.
<VulnDiscussion>It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, a...Rule Low Severity -
SRG-APP-000096-NDM-000226
<GroupDescription></GroupDescription>Group -
The DBN-6300 must produce audit records containing information to establish when (date and time) the events occurred.
<VulnDiscussion>It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, a...Rule Low Severity -
SRG-APP-000097-NDM-000227
<GroupDescription></GroupDescription>Group -
The DBN-6300 must produce audit records containing information to establish where the events occurred.
<VulnDiscussion>In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know...Rule Low Severity -
SRG-APP-000098-NDM-000228
<GroupDescription></GroupDescription>Group -
The DBN-6300 must produce audit log records containing information to establish the source of events.
<VulnDiscussion>In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know...Rule Low Severity -
SRG-APP-000099-NDM-000229
<GroupDescription></GroupDescription>Group -
The DBN-6300 must produce audit records that contain information to establish the outcome of the event.
<VulnDiscussion>Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attac...Rule Low Severity -
SRG-APP-000100-NDM-000230
<GroupDescription></GroupDescription>Group -
The DBN-6300 must generate audit records containing information that establishes the identity of any individual or process associated with the event.
<VulnDiscussion>Without information that establishes the identity of the subjects (i.e., administrators or processes acting on behalf of admi...Rule Low Severity -
SRG-APP-000101-NDM-000231
<GroupDescription></GroupDescription>Group -
The DBN-6300 must generate audit records containing the full-text recording of privileged commands.
<VulnDiscussion>Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Or...Rule Low Severity -
SRG-APP-000116-NDM-000234
<GroupDescription></GroupDescription>Group -
The DBN-6300 must use internal system clocks to generate time stamps for audit records.
<VulnDiscussion>In order to determine what is happening within the network infrastructure or to resolve and trace an attack, the network devi...Rule Medium Severity -
SRG-APP-000125-NDM-000241
<GroupDescription></GroupDescription>Group -
The DBN-6300 must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
<VulnDiscussion>Protection of log data includes assuring log data is not accidentally lost or deleted. Regularly backing up audit records to ...Rule Low Severity -
SRG-APP-000148-NDM-000346
<GroupDescription></GroupDescription>Group -
The DBN-6300 must uniquely identify and authenticate organizational administrators (or processes acting on behalf of organizational administrators).
<VulnDiscussion>To ensure accountability and prevent unauthenticated access, organizational administrators must be uniquely identified and au...Rule High Severity -
SRG-APP-000149-NDM-000247
<GroupDescription></GroupDescription>Group -
The DBN-6300 must use multifactor authentication for network access (remote and nonlocal) to privileged accounts.
<VulnDiscussion>Multifactor authentication requires using two or more factors to achieve authentication. Factors include: (i) something a u...Rule Medium Severity -
SRG-APP-000151-NDM-000248
<GroupDescription></GroupDescription>Group -
The DBN-6300 must use multifactor authentication for local access to privileged accounts.
<VulnDiscussion>Multifactor authentication is defined as using two or more factors to achieve authentication. Factors include: (i) Somethin...Rule Medium Severity -
SRG-APP-000156-NDM-000250
<GroupDescription></GroupDescription>Group -
The DBN-6300 must implement replay-resistant authentication mechanisms for network access to privileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.