III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000122-NDM-000239
<GroupDescription></GroupDescription>Group -
The FortiGate device must protect audit tools from unauthorized modification.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-APP-000378-NDM-000302
<GroupDescription></GroupDescription>Group -
The FortiGate device must prohibit installation of software without explicit privileged status.
<VulnDiscussion>Allowing anyone to install software, without explicit privileges, creates the risk that untested or potentially malicious sof...Rule Medium Severity -
SRG-APP-000380-NDM-000304
<GroupDescription></GroupDescription>Group -
The FortiGate device must enforce access restrictions associated with changes to device configuration.
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to device configuration may have significant effects o...Rule Medium Severity -
SRG-APP-000133-NDM-000244
<GroupDescription></GroupDescription>Group -
The FortiGate device must limit privileges to change the software resident within software libraries.
<VulnDiscussion>Changes to any software components of the network device can have significant effects on the overall security of the network....Rule Medium Severity -
SRG-APP-000516-NDM-000335
<GroupDescription></GroupDescription>Group -
The FortiGate device must enforce access restrictions associated with changes to the system components.
<VulnDiscussion>Changes to the hardware or software components of the network device can have significant effects on the overall security of ...Rule Medium Severity -
SRG-APP-000516-NDM-000336
<GroupDescription></GroupDescription>Group -
The FortiGate device must use LDAP for authentication.
<VulnDiscussion>Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control ...Rule Medium Severity -
SRG-APP-000516-NDM-000351
<GroupDescription></GroupDescription>Group -
The FortiGate device must be running an operating system release that is currently supported by the vendor.
<VulnDiscussion>Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated...Rule High Severity -
SRG-APP-000516-NDM-000334
<GroupDescription></GroupDescription>Group -
The FortiGate device must generate log records for a locally developed list of auditable events.
<VulnDiscussion>Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means...Rule Medium Severity -
SRG-APP-000516-NDM-000340
<GroupDescription></GroupDescription>Group -
The FortiGate device must conduct backups of system-level information contained in the information system when changes occur.
<VulnDiscussion>System-level information includes default and customized settings and security attributes, including ACLs that relate to the ...Rule Medium Severity -
SRG-APP-000516-NDM-000341
<GroupDescription></GroupDescription>Group -
The FortiGate device must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
<VulnDiscussion>Information system backup is a critical step in maintaining data assurance and availability. Information system and security-...Rule Medium Severity -
SRG-APP-000408-NDM-000314
<GroupDescription></GroupDescription>Group -
FortiGate devices performing maintenance functions must restrict use of these functions to authorized personnel only.
<VulnDiscussion>There are security-related issues arising from software brought into the network device specifically for diagnostic and repai...Rule Medium Severity -
SRG-APP-000516-NDM-000344
<GroupDescription></GroupDescription>Group -
The FortiGate device must use DoD-approved Certificate Authorities (CAs) for public key certificates.
<VulnDiscussion>For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB p...Rule Medium Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
The FortiGate device must prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services.
<VulnDiscussion>To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...Rule High Severity -
SRG-APP-000156-NDM-000250
<GroupDescription></GroupDescription>Group -
The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule Medium Severity -
SRG-APP-000395-NDM-000310
<GroupDescription></GroupDescription>Group -
The FortiGate device must authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...Rule Medium Severity -
SRG-APP-000395-NDM-000347
<GroupDescription></GroupDescription>Group -
The FortiGate device must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.
<VulnDiscussion>If NTP is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorre...Rule Medium Severity -
SRG-APP-000164-NDM-000252
<GroupDescription></GroupDescription>Group -
The FortiGate device must enforce a minimum 15-character password length.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-APP-000166-NDM-000254
<GroupDescription></GroupDescription>Group -
The FortiGate device must enforce password complexity by requiring that at least one uppercase character be used.
<VulnDiscussion>Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...Rule Medium Severity -
SRG-APP-000167-NDM-000255
<GroupDescription></GroupDescription>Group -
The FortiGate device must enforce password complexity by requiring that at least one lowercase character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000168-NDM-000256
<GroupDescription></GroupDescription>Group -
The FortiGate device must enforce password complexity by requiring at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000169-NDM-000257
<GroupDescription></GroupDescription>Group -
The FortiGate device must enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000172-NDM-000259
<GroupDescription></GroupDescription>Group -
The FortiGate device must use LDAPS for the LDAP connection.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule High Severity -
SRG-APP-000080-NDM-000345
<GroupDescription></GroupDescription>Group -
The FortiGate device must not have any default manufacturer passwords when deployed.
<VulnDiscussion>Network devices not protected with strong password schemes provide the opportunity for anyone to crack the password and gain ...Rule Medium Severity -
SRG-APP-000179-NDM-000265
<GroupDescription></GroupDescription>Group -
The FortiGate device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
<VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not validated and therefore cannot be ...Rule High Severity -
SRG-APP-000411-NDM-000330
<GroupDescription></GroupDescription>Group -
The FortiGate devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.
<VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.