Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000027-NDM-000209

    Group
  • The NSX Manager must configure logging levels for services to ensure audit records are generated.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • SRG-APP-000033-NDM-000212

    Group
  • The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.

    The lack of authorization-based access control could result in the immediate compromise and unauthorized access to sensitive information. Users must be assigned to roles which are configured with a...
    Rule High Severity
  • SRG-APP-000065-NDM-000214

    Group
  • The NSX Manager must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    Group
  • The NSX Manager must display the Standard Mandatory DOD Notice and Consent Banner before granting access.

    Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executi...
    Rule Medium Severity
  • SRG-APP-000069-NDM-000216

    Group
  • The NSX Manager must retain the Standard Mandatory DOD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.

    The banner must be acknowledged by the administrator prior to the device allowing the administrator access to the network device. This provides assurance that the administrator has seen the message...
    Rule Medium Severity
  • SRG-APP-000080-NDM-000220

    Group
  • The NSX Manager must be configured to integrate with an identity provider that supports multifactor authentication (MFA).

    Common attacks against single-factor authentication are attacks on user passwords. These attacks include brute force password guessing, password spraying, and password credential stuffing. This req...
    Rule High Severity
  • SRG-APP-000148-NDM-000346

    Group
  • The NSX Manager must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.

    Authentication for administrative (privileged level) access to the device is required at all times. An account can be created on the device's local database for use when the authentication server i...
    Rule Medium Severity
  • SRG-APP-000156-NDM-000250

    Group
  • The NSX Manager must only enable TLS 1.2 or greater.

    A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...
    Rule High Severity
  • SRG-APP-000164-NDM-000252

    Group
  • The NSX Manager must enforce a minimum 15-character password length for local accounts.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to d...
    Rule Medium Severity
  • SRG-APP-000166-NDM-000254

    Group
  • The NSX Manager must enforce password complexity by requiring that at least one uppercase character be used for local accounts.

    Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisti...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules