Riverbed SteelHead CX v8 NDM Security Technical Implementation Guide

  • Version/Release: V1R2
  • Published: 2019-10-01
  • Expand All:
  • Severity:
  • Sort:
Compare

Select any two versions of this STIG to compare the individual requirements

View

Select any old version/release of this STIG to view the previous requirements

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.
b
Riverbed Optimization System (RiOS) must provide automated support for account management functions.
AC-2 - Medium - CCI-000015 - V-62789 - SV-77279r1_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-000015
Version
RICX-DM-000001
Vuln IDs
  • V-62789
Rule IDs
  • SV-77279r1_rule
Account management functions include: assignment of group or role membership; identifying account type; specifying user access authorizations (i.e., privileges); account removal, update, or termination; and administrative alerts. The network device must be configured to automatically provide account management functions, and these functions must immediately enforce the organization's current account policy. All accounts used for access to the network device are privileged or system-level accounts. Therefore, if account management functions are not automatically enforced, an attacker could gain privileged access to a vital element of the network security architecture. This control does not include emergency administration accounts that provide access to the network device components in case of network failure. There must be only one such locally defined account. All other accounts must be defined. All other accounts must be created and managed on the site's authentication server (e.g., RADIUS, LDAP, or Active Directory). This requirement is applicable to account management functions provided by the network device application. If the function is provided by the underlying OS or an authentication server, it must be secured using the applicable security guide or STIG.
Checks: C-63597r1_chk

Verify that RiOS provides automated support for account management. Navigate to the device Management Console Navigate to: Configure >> Security >> User Permissions Verify user permissions are defined here. If the account management is not set, this is a finding.

Fix: F-68709r2_fix

Configure RiOS account management functions. Navigate to the device Management Console, then Navigate to: Configure >> Security >> User Permissions Set values for the user account. Click "Save" to save these settings permanently.

b
Riverbed Optimization System (RiOS) must terminate local shared/group account credentials, such as the Admin account is used, when members who know the account password leave the group.
AC-2 - Medium - CCI-002142 - V-62835 - SV-77325r1_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-002142
Version
RICX-DM-000002
Vuln IDs
  • V-62835
Rule IDs
  • SV-77325r1_rule
If shared/group account credentials are not terminated when individuals leave the group, the user that left the group can still gain access even though they are no longer authorized. A shared/group account credential is a shared form of authentication that allows multiple individuals to access the network device using a single account. There may also be instances when specific user actions need to be performed on the network device without unique administrator identification or authentication. Examples include system accounts, account of last resort, accounts used for testing/maintenance, and shared secrets that are configured on the administrator's workstation. When users with knowledge of the account of last resort or default accounts are no longer authorized, account credentials must be changed in accordance with DoD policy.
Checks: C-63629r1_chk

Verify RiOS is configured to protect the confidentiality and integrity of system information at rest. Navigate to the Device Management Console Set the "Username" to "admin" Set the "Password" to "password" Click "Log In" If login occurs and administrative access is allowed, this is a finding.

Fix: F-68753r1_fix

Configure RiOS to protect the confidentiality and integrity of system information at rest. Navigate to the Device Management Console Set the "Username" to "admin" Set the "Password" to "password" Click "Log In" Navigate to Configure >> My Account Select "Change Password" Enter new password in "New Password:" Enter new password in "Confirm New Password" Click "Apply" Navigate to the top right of the screen and click "Logout" to exit the current session Navigate to the Device Management Console Set the "Username" to "admin" Set the "Password" to the new password Click "Log In" Verify that the administrator obtains access to the Device Management Console Home Page Navigate to the top right of the screen and click "Logout" to exit the current session

b
Riverbed Optimization System (RiOS) must disable the local Shark and Monitor accounts so they cannot be used as shared accounts by users.
AC-2 - Medium - CCI-002142 - V-62837 - SV-77327r1_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-002142
Version
RICX-DM-000003
Vuln IDs
  • V-62837
Rule IDs
  • SV-77327r1_rule
The Monitor and Shark accounts which are default group accounts with shared credentials. Monitor and Shark accounts are not enabled by default, but cannot be deleted since these network tools are designed to look for that account. Monitor is a read-only account for auditor's configuration management. Shark is used to access packet captures. If the credentials for these accounts are changed, the function of the system will not be adversely impacted.
Checks: C-63631r1_chk

Verify that RiOS is configured to the assigned privilege level for each administrator. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Verify the privilege level values for Shark and Monitor If all privileges for the Shark and Monitor accounts are not set to Deny, this is a finding.

Fix: F-68755r1_fix

Configure RiOS to enforce assigned privilege level for each administrator in accordance with site documented requirements. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Remove all values of "Roles and Permissions" for the Monitor and Shark accounts Click "Apply" to save the changes Navigate to the top of the web page and click "Save" to write changes to memory

a
Riverbed Optimization System (RiOS) must automatically generate a log event for account creation events.
AC-2 - Low - CCI-000018 - V-62839 - SV-77329r1_rule
RMF Control
AC-2
Severity
Low
CCI
CCI-000018
Version
RICX-DM-000007
Vuln IDs
  • V-62839
Rule IDs
  • SV-77329r1_rule
Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. Notification of account creation helps to mitigate this risk. Auditing account creation provides the necessary reconciliation that account management procedures are being followed. Without this audit trail, personnel without the proper authorization may gain access to critical network nodes.
Checks: C-63633r1_chk

Verify that RiOS is configured to generate a log event for account creation events. Create an account Navigate to the device Management Console, then Navigate to: Reports >> Diagnostics >> System Logs Enter the account name into the filter and click Go Delete the account that was created If no event record for the user creation action exists in the event log, this is a finding.

Fix: F-68757r1_fix

Configure RiOS to generate a log event for account creation events. Navigate to the device Management Console, then Navigate to: Configure >> System Settings >> Logging Under Configuration, set minimum severity to Info

a
Riverbed Optimization System (RiOS) must automatically log event for account modification.
AC-2 - Low - CCI-001403 - V-62841 - SV-77331r1_rule
RMF Control
AC-2
Severity
Low
CCI
CCI-001403
Version
RICX-DM-000008
Vuln IDs
  • V-62841
Rule IDs
  • SV-77331r1_rule
Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security of the network device. Account management by a designated authority ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel with the appropriate and necessary privileges. Auditing account modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed. If modifications to management accounts are not audited, reconciliation of account management procedures cannot be tracked.
Checks: C-63635r1_chk

Verify that RiOS is configured to generate a log event for account creation events. Create an account Modify this user account Navigate to the device Management Console, then Navigate to: Reports >> Diagnostics >> System Logs Enter the account name into the filter and click Go Delete the account that was created If no event record for the user creation action exists in the event log, this is a finding.

Fix: F-68759r1_fix

Configure RiOS to generate a log event for account creation events. Navigate to the device Management Console, then Navigate to: Configure >> System Settings >> Logging Under Configuration, set minimum severity to Info Click "Save" (The actual level for these messages is Notifications; however, other settings in this STIG call for the Info level and only one can be selected.)

a
Riverbed Optimization System (RiOS) must automatically generate a log event for account disabling actions.
AC-2 - Low - CCI-001404 - V-62843 - SV-77333r1_rule
RMF Control
AC-2
Severity
Low
CCI
CCI-001404
Version
RICX-DM-000009
Vuln IDs
  • V-62843
Rule IDs
  • SV-77333r1_rule
Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account disabling actions will support account management procedures. When device management accounts are disabled, user or service accessibility may be affected. Auditing also ensures authorized active accounts remain enabled and available for use when required.
Checks: C-63637r1_chk

Verify that RiOS is configured to generate a log event for account creation events. Create an account To disable an account Navigate to the device Management Console, then Navigate to: Configure >> Security >> User >> Permissions Deselect Enable Account Click "Apply" Navigate to the device Management Console, then Navigate to: Reports >> Diagnostics >> System Logs Enter the account name into the filter and click Go Delete the account that was created If no event record for the user disabling action exists in the event log, this is a finding.

Fix: F-68761r1_fix

Configure RiOS to generate a log event for account disabling actions. Navigate to the device Management Console, then Navigate to: Configure >> System Settings >> Logging Under Configuration, set minimum severity to Info Click "Save" Under Configuration, set minimum severity to Info.

a
Riverbed Optimization System (RiOS) must automatically generate a log event for account removal actions.
AC-2 - Low - CCI-001405 - V-62845 - SV-77335r1_rule
RMF Control
AC-2
Severity
Low
CCI
CCI-001405
Version
RICX-DM-000010
Vuln IDs
  • V-62845
Rule IDs
  • SV-77335r1_rule
Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will support account management procedures. When device management accounts are terminated, user or service accessibility may be affected. Auditing also ensures authorized active accounts remain enabled and available for use when required.
Checks: C-63639r1_chk

Verify that RiOS is configured to generate a log event for account creation events. Create an account To disable an account Navigate to the device Management Console, then Navigate to: Configure >> Security >> User >> Permissions Select the account to be removed Click Remove Selected Account Navigate to the device Management Console, then Navigate to: Reports >> Diagnostics >> System Logs Enter the account name into the filter and click "Go" Delete the account that was created. If no event record for the user removal action exists in the event log, this is a finding.

Fix: F-68763r1_fix

Configure RiOS to generate a log event for account disabling actions. Navigate to the device Management Console, then Navigate to: Configure >> System Settings >> Logging Under Configuration, set minimum severity to Info Click "Save" Under Configuration, set minimum severity to Info.

b
Riverbed Optimization System (RiOS) must generate alerts that can be forwarded to the administrators and ISSO when local accounts are created.
AC-2 - Medium - CCI-001683 - V-62847 - SV-77337r2_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-001683
Version
RICX-DM-000011
Vuln IDs
  • V-62847
Rule IDs
  • SV-77337r2_rule
An authorized insider or individual who maliciously creates a local account could gain immediate access from a remote location to privileged information on a critical security device. Sending an alert to the administrators and ISSO when this action occurs greatly reduces the risk that accounts will be surreptitiously created. RiOS can be configured to send an SNMP trap to the SNMP server. It also sends a message to the Syslog and the local log. Either of these methods results in an alert that can be forwarded to authorized accounts.
Checks: C-63641r2_chk

Verify that RiOS captures an SNMP trap for user creation events that can be sent to the ISSO and designated administrators by the SNMP server. Navigate to the device Management Console Navigate to Configure >> System Settings >> Email Verify that an SMTP Server is defined Verify that an SMTP Port is defined Verify that "Report Events via Email" is checked and that at least one email address is defined Verify that "Report Failures via Email" is checked and that at least one email address is defined If an email for the ISSO and the system administrator accounts are not defined, this is a finding.

Fix: F-68765r2_fix

Configure RiOS to capture an SNMP trap for user creation events that can be sent to the ISSO and designated administrators by the SNMP server. Navigate to the device Management Console Navigate to Configure >> System Settings >> Email Enter an SMTP Server name Enter n SMTP Port number Check "Report Events via Email" and enter at least one email address Check "Report Failures via Email" and enter at least one email address

a
Riverbed Optimization System (RiOS) must generate alerts that can be forwarded to the administrators and ISSO when accounts are modified.
AC-2 - Low - CCI-001684 - V-62849 - SV-77339r1_rule
RMF Control
AC-2
Severity
Low
CCI
CCI-001684
Version
RICX-DM-000012
Vuln IDs
  • V-62849
Rule IDs
  • SV-77339r1_rule
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply modify an existing account. Notification of account modification is one method for mitigating this risk. A comprehensive account management process will ensure an audit trail which documents the modification of device administrator accounts and notifies administrators and Information System Security Officers (ISSO). Such a process greatly reduces the risk that accounts will be surreptitiously modified and provides logging that can be used for forensic purposes. The network device must generate the alert. Notification may be done by a management server.
Checks: C-63643r1_chk

Verify that RiOS uses automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Verify that Host Servers are defined in the section "Trap Receivers" If there are no Host Servers defined in "Trap Receivers", this is a finding.

Fix: F-68767r1_fix

Configure RiOS to use automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver IP Address" to the address of the trap receiver Set "Destination Port:" to the port that the Trap Receiver is listening on Set "Receiver Type:" to v3 Set "Remote User:" to the user name on the Trap Receiver Set "Authentication:" to <Supply a key based> Set "Authentication Protocol:" to SHA SHA Key: <enter the SHA key> Set "Security Level:" to Auth/Priv Set "Privacy Protocol:" to "AES" Set "Privacy:" to Select "same as Authentication Key" Set "Enable Receiver" Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently.

a
Riverbed Optimization System (RiOS) must generate alerts that can be forwarded to the administrators and ISSO when accounts are disabled.
AC-2 - Low - CCI-001685 - V-62851 - SV-77341r1_rule
RMF Control
AC-2
Severity
Low
CCI
CCI-001685
Version
RICX-DM-000013
Vuln IDs
  • V-62851
Rule IDs
  • SV-77341r1_rule
When application accounts are disabled, administrator accessibility is affected. Accounts are utilized for identifying individual device administrators or for identifying the device processes themselves. In order to detect and respond to events that affect administrator accessibility and device processing, devices must audit account disabling actions and, as required, notify the appropriate individuals so they can investigate the event. Such a capability greatly reduces the risk that device accessibility will be negatively affected for extended periods of time and also provides logging that can be used for forensic purposes.
Checks: C-63645r1_chk

Verify that RiOS uses automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; SNMP Basic Verify that Host Servers are defined in the section "Trap Receivers" If there are no Host Servers defined in "Trap Receivers", this is a finding.

Fix: F-68769r1_fix

Configure RiOS to use automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver IP Address" to the address of the trap receiver Set "Destination Port:" to the port that the Trap Receiver is listening on Set "Receiver Type:" to v3 Set "Remote User:" to the user name on the Trap Receiver Set "Authentication:" to <Supply a key based> Set "Authentication Protocol:" to SHA SHA Key: <enter the SHA key> Set "Security Level:" to Auth/Priv Set "Privacy Protocol:" to "AES" Set "Privacy:" to Select "same as Authentication Key" Set "Enable Receiver" Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently.

a
Riverbed Optimization System (RiOS) must generate alerts that can be forwarded to the administrators and ISSO when accounts are removed.
AC-2 - Low - CCI-001686 - V-62853 - SV-77343r1_rule
RMF Control
AC-2
Severity
Low
CCI
CCI-001686
Version
RICX-DM-000014
Vuln IDs
  • V-62853
Rule IDs
  • SV-77343r1_rule
When application accounts are removed, administrator accessibility is affected. Accounts are utilized for identifying individual device administrators or for identifying the device processes themselves. In order to detect and respond to events that affect administrator accessibility and device processing, devices must audit account removal actions and, as required, notify the appropriate individuals so they can investigate the event. Such a capability greatly reduces the risk that device accessibility will be negatively affected for extended periods of time and also provides logging that can be used for forensic purposes.
Checks: C-63647r1_chk

Verify that RiOS uses automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; SNMP Basic Verify that Host Servers are defined in the section "Trap Receivers" If there are no Host Servers defined in "Trap Receivers", this is a finding.

Fix: F-68771r1_fix

Configure RiOS to use automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver IP Address" to the address of the trap receiver Set "Destination Port:" to the port that the Trap Receiver is listening on Set "Receiver Type:" to "v3" Set "Remote User:" to the user name on the Trap Receiver Set "Authentication:" to <Supply a key based> Set "Authentication Protocol:" to "SHA" SHA Key: <enter the SHA key> Set "Security Level:" to Auth/Priv Set "Privacy Protocol:" to "AES" Set "Privacy:" to Select "same as Authentication Key" Set "Enable Receiver" Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently.

b
Riverbed Optimization System (RiOS) must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
AC-3 - Medium - CCI-000213 - V-62855 - SV-77345r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-000213
Version
RICX-DM-000017
Vuln IDs
  • V-62855
Rule IDs
  • SV-77345r1_rule
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems must be properly configured to incorporate access control methods that do not rely solely on the possession of a certificate for access. Successful authentication must not automatically give an entity access to an asset or security boundary. Authorization procedures and controls must be implemented to ensure each authenticated entity also has a validated and current authorization. Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset. Network devices use access control policies and enforcement mechanisms to implement this requirement. Access control policies include identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include access control lists, access control matrices, and cryptography. These policies and mechanisms must be employed by the network device to control access between administrators (or processes acting on behalf of administrators) and objects (e.g., device commands, files, records, processes) in the network device.
Checks: C-63649r1_chk

Verify that RiOS is configured to the assigned privilege level for each administrator. Navigate to the device CLI Type: show rbm users Verify that the privilege level is correct for each administrator -- or -- Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; User Permissions Verify that the privilege level is correct for each administrator If the privilege level settings are not in accordance with applicable policy, this is a finding.

Fix: F-68773r1_fix

Configure RiOS to enforce assigned privilege level for each administrator. Navigate to the device CLI Type: rbm user <username> role <role> permissions <permissions> Set the value of username, role, and permissions according to the privilege level of the applicable policy Type: write memory to save the current configuration settings to memory -- or -- Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Set the values of 'Roles and Permissions' according to the privilege level in accordance with applicable policy Click "Apply" to save the changes Navigate to the top of the web page and click "Save" to write changes to memory

a
Riverbed Optimization System (RiOS) must generate a log event when privileged functions are executed.
AC-6 - Low - CCI-002234 - V-62857 - SV-77347r1_rule
RMF Control
AC-6
Severity
Low
CCI
CCI-002234
Version
RICX-DM-000023
Vuln IDs
  • V-62857
Rule IDs
  • SV-77347r1_rule
Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing the use of privileged functions is one way to detect such misuse and identify the risk from insider threats and the advanced persistent threat.
Checks: C-63651r1_chk

Verify the device generates a log event when commands are executed. Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; Logging Under Logging Configurations, verify Minimum Severity is set to Info If the Standard Mandatory DoD Notice and Consent Banner does not exist on this page, this is a finding.

Fix: F-68775r1_fix

Since all commands on the device are privileged commands, the following command ensures execution of commands are sent to the Syslog Server. Navigate to the Device Management Console Navigate to Configure >> System Settings >> Logging Under "Remote Log Servers", click "Add a New Log Server" Enter the server IP address Under Logging Configurations >> Minimum Severity, select "Info" Click "Add" Add an IP and Minimum Severity level for the backup Syslog server.

b
Riverbed Optimization System (RiOS) must enforce the limit of three (3) consecutive invalid logon attempts by a user during a 15-minute time period for device console access.
AC-7 - Medium - CCI-000044 - V-62859 - SV-77349r1_rule
RMF Control
AC-7
Severity
Medium
CCI
CCI-000044
Version
RICX-DM-000024
Vuln IDs
  • V-62859
Rule IDs
  • SV-77349r1_rule
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
Checks: C-63653r1_chk

Verify that RiOS is configured to limit the number of invalid logon attempts during a 15 minute period to 3. Login to the device console to access the command line interface (CLI) Type: show authentication policy Verify that "Maximum unsuccessful logins before account lockout:" is set to "3" Verify that "Wait before account unlock:" is set to "900" seconds If "Maximum unsuccessful logins before account lockout" is not set to "3" and/or "Wait before account unlock" is not set to "900" seconds, this is a finding.

Fix: F-68777r1_fix

Configure RiOS to limit the number of invalid logon attempts to 3 during a 15 minute period. Login to the device console to access the command line interface (CLI) Type: enable Type: conf t Type: authentication policy template strong Scroll down to "Maximum unsuccessful logins before account lockout:" and type "3" Under "Wait before account unlock:" and type "900" Seconds Type: write memory

b
Riverbed Optimization System (RiOS) must enforce the limit of three (3) consecutive invalid logon attempts by a user during a 15-minute time period for web-based management access.
AC-7 - Medium - CCI-000044 - V-62861 - SV-77351r1_rule
RMF Control
AC-7
Severity
Medium
CCI
CCI-000044
Version
RICX-DM-000025
Vuln IDs
  • V-62861
Rule IDs
  • SV-77351r1_rule
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
Checks: C-63655r1_chk

Verify that RiOS is configured to limit the number of invalid logon attempts during a 15 minute period to 3. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Password Policy Verify that "Login Attempts Before Lockout:" is set to "3" Verify that "Timeout for User Login After Lockout (seconds)" is set to "900" If "Login Attempts Before Lockout" is not set to "3" and/or "Timeout for User Login After Lockout (seconds)" is not set to "900", this is a finding.

Fix: F-68779r1_fix

Configure RiOS to limit the number of invalid logon attempts to 3 during a 15 minute period. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Login Attempts Before Lockout:" to "3" Set the value of "Timeout for User Login After Lockout (seconds);" to "900" Click "Apply" to save the changes Navigate to the top of the web page and click "Save" to write changes to memory

b
Riverbed Optimization System (RiOS) must automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
AC-7 - Medium - CCI-002238 - V-62863 - SV-77353r1_rule
RMF Control
AC-7
Severity
Medium
CCI
CCI-002238
Version
RICX-DM-000026
Vuln IDs
  • V-62863
Rule IDs
  • SV-77353r1_rule
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.
Checks: C-63657r1_chk

Verify that RiOS is configured to limit the number of unsuccessful login attempts during a 15-minute period to 3. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Password Policy Verify that "Login Attempts Before Lockout:" is set to "3" Verify that "Timeout for User Login After Lockout (seconds)" is set to "900" If "Login Attempts Before Lockout" is not set to "3" and/or "Timeout for User Login After Lockout (seconds)" is not set to "900", this is a finding.

Fix: F-68781r1_fix

Configure RiOS to limit the number of unsuccessful login attempts to 3 during a 15-minute period. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Login Attempts Before Lockout:" to "3" Set the value of "Timeout for User Login After Lockout (seconds);" to "900" Click "Apply" to save the changes Navigate to the top of the web page and click "Save" to write changes to memory

b
Riverbed Optimization System (RiOS) must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
AC-8 - Medium - CCI-000048 - V-62865 - SV-77355r1_rule
RMF Control
AC-8
Severity
Medium
CCI
CCI-000048
Version
RICX-DM-000027
Vuln IDs
  • V-62865
Rule IDs
  • SV-77355r1_rule
Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notifications are required only for access via logon interfaces with human users.
Checks: C-63659r1_chk

Verify that RiOS is configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device. Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; Announcements Verify that the Standard Mandatory DoD Notice and Consent Banner is contained in the Logon Message If the Standard Mandatory DoD Notice and Consent Banner does not exist on this page, this is a finding.

Fix: F-68783r1_fix

Configure RiOS to display the Standard Mandatory DoD Notice and Consent Banner. Navigate to the Device Management Console Navigate to Configure >> System Settings >> Announcement Cut and past the DoD banner into the Logon Message box: You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. Click "Apply" to save the changes Navigate to the top of the web page and click "Save" to write changes to memory

b
Riverbed Optimization System (RiOS) must limit the number of concurrent sessions to one (1) for each administrator account and/or administrator account type.
AC-10 - Medium - CCI-000054 - V-62867 - SV-77357r1_rule
RMF Control
AC-10
Severity
Medium
CCI
CCI-000054
Version
RICX-DM-000034
Vuln IDs
  • V-62867
Rule IDs
  • SV-77357r1_rule
Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administrator is helpful in limiting risks related to DoS attacks. This requirement addresses concurrent sessions for administrative accounts and does not address concurrent sessions by a single administrator via multiple administrative accounts. The maximum number of concurrent sessions should be defined based upon mission needs and the operational environment for each system. Recommended best practice for authentication and authorization is to leverage an AAA server (e.g., TACACS or RADIUS). Password of Last Resort is not affected by this requirement. Note that this is a hidden CLI command. Access to the device management console is not affected by this command.
Checks: C-63661r1_chk

Verify that RiOS is configured to limit the number of concurrent sessions to one (1) for each administrator account and/or administrator account type. This requirement does not apply to the Admin account. Navigate to the device CLI Type: enable Type: show username &lt;user-other-than-admin&gt; detailed Verify that "Maximum Logins" is set to "1" If "Maximum Logins" is not set to "1", this is a finding.

Fix: F-68785r1_fix

Configure the number of concurrent sessions to an organization define number for each administrator account and/or administrator type account. Navigate to the device CLI Type: enable Type: conf t Type: authentication policy user <user name> max-logins 1 Type: write memory Settings are now saved to memory.

b
Riverbed Optimization System (RiOS) must automatically terminate a network administrator session after organization-defined conditions or trigger events requiring session disconnect.
AC-12 - Medium - CCI-002361 - V-62897 - SV-77387r1_rule
RMF Control
AC-12
Severity
Medium
CCI
CCI-002361
Version
RICX-DM-000039
Vuln IDs
  • V-62897
Rule IDs
  • SV-77387r1_rule
Automatic session termination addresses the termination of administrator-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., network disconnect). A logical session (for local, network, and remote access) is initiated whenever an administrator (or process acting on behalf of a user) accesses a network device. Such administrator sessions can be terminated (and thus terminate network administrator access) without terminating network sessions. Session termination terminates all processes associated with an administrator's logical session except those processes that are specifically created by the administrator (i.e., session owner) to continue after the session is terminated. Conditions or trigger events requiring automatic session termination can include, for example, organization-defined periods of user inactivity, targeted responses to certain types of incidents, and time-of-day restrictions on information system use. These conditions will vary across environments and network device types.
Checks: C-63663r1_chk

Verify that RiOS is configured to terminate a network administrator's session after a trigger event such as inactivity timeout. Navigate to the device CLI Type: enable Type: show web Verify that "Inactivity Timeout:" is set to the organizations defined condition If no triggers are required by the organization, this is a finding.

Fix: F-68815r1_fix

Configure RiOS to automatically terminate a network administrator's session after a trigger event such as an inactivity timeout. Navigate to the device CLI Type: enable Type: conf t Type: web auto-logout <organization defined condition in minutes> Type: write memory Type: exit Type: show web Verify that "Inactivity Timeout:" represents the value entered above. Type: exit

b
Riverbed Optimization System (RiOS) must generate audit records containing the full-text recording of privileged commands.
AU-3 - Medium - CCI-000135 - V-62899 - SV-77389r1_rule
RMF Control
AU-3
Severity
Medium
CCI
CCI-000135
Version
RICX-DM-000049
Vuln IDs
  • V-62899
Rule IDs
  • SV-77389r1_rule
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requirements. The additional information required is dependent on the type of information (i.e., sensitivity of the data and the environment within which it resides). At a minimum, the organization must audit full-text recording of privileged commands. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise.
Checks: C-63665r1_chk

Verify that RiOS is configured to generate audit records containing the full-text recording of privileged commands Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; Logging Verify that "Minimum Severity" is set to "info" If the "Minimum Severity" is not set to "info", this is a finding.

Fix: F-68817r1_fix

Configure RiOS to generate audit records containing the full-text recording of privileged commands Navigate to the device Management Console Navigate to Configure >> System Settings >> Logging Set "Minimum Severity" to "info" Click "Apply" Navigate to the top of the screen and click "Save"

b
Riverbed Optimization System (RiOS) must generate an email alert of all log failure events requiring alerts.
AU-5 - Medium - CCI-001858 - V-62901 - SV-77391r1_rule
RMF Control
AU-5
Severity
Medium
CCI
CCI-001858
Version
RICX-DM-000053
Vuln IDs
  • V-62901
Rule IDs
  • SV-77391r1_rule
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impending failure of the audit capability and system operation may be adversely affected. Alerts provide organizations with urgent messages. Real-time alerts provide these messages immediately (i.e., the time from event detection to alert occurs in seconds or less).
Checks: C-63667r1_chk

Verify that RiOS is configured to generate an immediate real-time alert for all audit failure events requiring real-time alerts. Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; Email Verify that an SMTP Server is defined Verify that an SMTP Port is defined Verify that "Report Events via Email" is checked and that at least one email address is defined Verify that "Report Failures via Email" is checked and that at least one email address is defined If no email accounts are defined, this is a finding.

Fix: F-68819r1_fix

Configure RiOS to generate an immediate real-time alert for all audit failure events requiring real-time alerts. Navigate to the device Management Console Navigate to Configure >> System Settings >> Email Enter an SMTP Server name Enter n SMTP Port number Check "Report Events via Email" and enter at least one email address Check "Report Failures via Email" and enter at least one email address

b
Riverbed Optimization System (RiOS) must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
AU-5 - Medium - CCI-000139 - V-62917 - SV-77407r1_rule
RMF Control
AU-5
Severity
Medium
CCI
CCI-000139
Version
RICX-DM-000054
Vuln IDs
  • V-62917
Rule IDs
  • SV-77407r1_rule
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an impending failure of the audit capability and system operation may be adversely affected. Audit processing failures include software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded.
Checks: C-63669r1_chk

Verify that RiOS uses automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; SNMP Basic Verify that Host Servers are defined in the section "Trap Receivers" If there are no Host Servers defined in "Trap Receivers", this is a finding.

Fix: F-68835r1_fix

Configure RiOS to use automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver IP Address" to the address of the trap receiver Set "Destination Port:" to the port that the Trap Receiver is listening on Set "Receiver Type:" to "v3" Set "Remote User:" to the user name on the Trap Receiver Set "Authentication:" to <Supply a key based> Set "Authentication Protocol:" to "SHA" SHA Key: <enter the SHA key> Set "Security Level:" to "Auth/Priv" Set "Privacy Protocol:" to "AES" Set "Privacy:" to Select "same as Authentication Key" Set "Enable Receiver" Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently.

b
Riverbed Optimization System (RiOS) must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).
AU-8 - Medium - CCI-001890 - V-62921 - SV-77411r1_rule
RMF Control
AU-8
Severity
Medium
CCI
CCI-001890
Version
RICX-DM-000059
Vuln IDs
  • V-62921
Rule IDs
  • SV-77411r1_rule
If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC.
Checks: C-63673r1_chk

Verify that RiOS is configured select UTC. Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; Date and Time Verify that "UTC" is selected If no NTP Servers are visible after the command "show ntp all" or on "Requested Servers", this is a finding.

Fix: F-68839r1_fix

Configure RiOS enable UTC. Navigate to the device Management Console Navigate to Configure >> System Settings >> Date and Time Select "UTC" for the Time Zone Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must protect audit information from any type of unauthorized read access.
AU-9 - Medium - CCI-000162 - V-62923 - SV-77413r1_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-000162
Version
RICX-DM-000061
Vuln IDs
  • V-62923
Rule IDs
  • SV-77413r1_rule
Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In addition, access to audit records provides information an attacker could use to his or her advantage. To ensure the veracity of audit data, the information system and/or the network device must protect audit information from any and all unauthorized read access. This requirement can be achieved through multiple methods which will depend upon system architecture and design. Commonly employed methods for protecting audit information include least privilege permissions as well as restricting the location and number of log file repositories. Additionally, network devices with user interfaces to audit records should not allow for the unfettered manipulation of or access to those records via the device interface. If the device provides access to the audit data, the device becomes accountable for ensuring audit information is protected from unauthorized access.
Checks: C-63675r1_chk

Verify that RiOS is configured to protect audit information from any type of unauthorized read access. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; User Permissions Select the view icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.

Fix: F-68841r1_fix

Configure RiOS to protect audit information from any type of unauthorized read access. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user. Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory

b
Riverbed Optimization System (RiOS) must protect audit information from unauthorized modification.
AU-9 - Medium - CCI-000163 - V-62925 - SV-77415r1_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-000163
Version
RICX-DM-000062
Vuln IDs
  • V-62925
Rule IDs
  • SV-77415r1_rule
Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit network device activity. If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit data, the network device must protect audit information from unauthorized modification. This requirement can be achieved through multiple methods, which will depend upon system architecture and design. Some commonly employed methods include ensuring log files receive the proper file system permissions and limiting log data locations. Network devices providing a user interface to audit data will leverage user permissions and roles identifying the user accessing the data and the corresponding rights that the user enjoys in order to make access decisions regarding the modification of audit data.
Checks: C-63677r1_chk

Verify that RiOS is configured to protect audit information from unauthorized modification. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; User Permissions Select the "View" icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.

Fix: F-68843r1_fix

Configure RiOS to protect audit information from unauthorized modification. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user. Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory

b
Riverbed Optimization System (RiOS) must protect audit information from unauthorized deletion.
AU-9 - Medium - CCI-000164 - V-62927 - SV-77417r1_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-000164
Version
RICX-DM-000063
Vuln IDs
  • V-62927
Rule IDs
  • SV-77417r1_rule
Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit data, the network device must protect audit information from unauthorized deletion. This requirement can be achieved through multiple methods, which will depend upon system architecture and design. Some commonly employed methods include: ensuring log files receive the proper file system permissions utilizing file system protections, restricting access, and backing up log data to ensure log data is retained. Network devices providing a user interface to audit data will leverage user permissions and roles identifying the user accessing the data and the corresponding rights the user enjoys in order to make access decisions regarding the deletion of audit data.
Checks: C-63679r1_chk

Verify that RiOS is configured to protect audit information from unauthorized deletion. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; User Permissions Select the "View" icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.

Fix: F-68845r1_fix

Configure RiOS to protect audit information from unauthorized deletion. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory

b
Riverbed Optimization System (RiOS) must protect audit tools from unauthorized access.
AU-9 - Medium - CCI-001493 - V-62929 - SV-77419r1_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-001493
Version
RICX-DM-000064
Vuln IDs
  • V-62929
Rule IDs
  • SV-77419r1_rule
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit data. Network devices providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the access to audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.
Checks: C-63681r1_chk

Verify that RiOS is configured to protect audit tools from unauthorized access. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; User Permissions Select the "View" icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.

Fix: F-68847r1_fix

Configure RiOS to protect audit tools from unauthorized access. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user. Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory

b
Riverbed Optimization System (RiOS) must protect audit tools from unauthorized deletion.
AU-9 - Medium - CCI-001495 - V-62931 - SV-77421r1_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-001495
Version
RICX-DM-000066
Vuln IDs
  • V-62931
Rule IDs
  • SV-77421r1_rule
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operations on audit data. Network devices providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the access to audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.
Checks: C-63683r1_chk

Verify that RiOS is configured to protect audit tools from unauthorized deletion. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; User Permissions Select the "View" icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.

Fix: F-68849r1_fix

Configure RiOS to protect audit tools from unauthorized deletion. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory

b
Riverbed Optimization System (RiOS) must provide audit record generation capability for DoD-defined auditable events within the network device.
AU-12 - Medium - CCI-000169 - V-62933 - SV-77423r1_rule
RMF Control
AU-12
Severity
Medium
CCI
CCI-000169
Version
RICX-DM-000071
Vuln IDs
  • V-62933
Rule IDs
  • SV-77423r1_rule
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., process, module). Certain specific device functionalities may be audited as well. The list of audited events is the set of events for which audits are to be generated. This set of events is typically a subset of the list of all events for which the system is capable of generating audit records. DoD has defined the list of events for which the device will provide an audit record generation capability as the following: (i) Successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels); (ii) Access actions, such as successful and unsuccessful logon attempts, privileged activities or other system level access, starting and ending time for user access to the system, concurrent logons from different workstations, successful and unsuccessful accesses to objects, all program initiations, and all direct access to the information system; and (iii) All account creation, modification, disabling, and termination actions.
Checks: C-63685r1_chk

Verify that RiOS is configured to off-load audit records (logs) onto a different system than the system being audited. Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; Logging Verify that "Remote Log Servers" contains IP addresses for all available log servers View "Per-Process Logging" section to see if a process or severity has been configured. Note: This only affects the system log, not the user type facilities. If a filter has been added in 'Per-Process Logging" which prevents the capture of DoD-defined auditable events, this is a finding. If "Remote Log Servers" is empty and no remote log servers are configured, this is a finding.

Fix: F-68851r1_fix

Configure RiOS to off-load audit records onto a different system than the system being audited. Navigate to the device Management Console Navigate to Configure >> System Settings >> Logging Click on "Add a New Log Server" Set "Server IP" to the IP address of the remote log server Set "Minimum Severity" to Info In the Pre-Process Logging area, Click Remote Selected if any of the filtered processes violate the capture of DoD-defined auditable events. Click "Add" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be logged.
AU-12 - Medium - CCI-000171 - V-62935 - SV-77425r1_rule
RMF Control
AU-12
Severity
Medium
CCI
CCI-000171
Version
RICX-DM-000072
Vuln IDs
  • V-62935
Rule IDs
  • SV-77425r1_rule
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audits may degrade the system's performance by overwhelming the audit log. Misconfigured audits may also make it more difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.
Checks: C-63687r1_chk

Verify that RiOS restricts permission to select auditable event to authorized administrators. Navigate to the device Management Console Navigate to: Configure &gt;&gt; Security &gt;&gt; User Permissions Verify the "Deny" attribute is selected for "Basic Diagnostics", "TCP Dumps", "Reports" permissions If the "Deny" attribute is not set for users who are not authorized access to configure auditable events, this is a finding.

Fix: F-68853r1_fix

Configure RiOS permission for auditable events. Navigate to the device Management Console, then Navigate to: Configure >> Security >> User Permissions Select the user For "Basic Diagnostics", "TCP Dumps", "Reports". Click the "Deny" attribute Click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
CM-6 - Medium - CCI-000366 - V-62937 - SV-77427r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
RICX-DM-000082
Vuln IDs
  • V-62937
Rule IDs
  • SV-77427r1_rule
The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other functions. Multiple time sources provide redundancy by including a secondary source. Time synchronization is usually a hierarchy; clients synchronize time to a local source while that source synchronizes its time to a more accurate source. The network device must utilize an authoritative time server and/or be configured to use redundant authoritative time sources. This requirement is related to the comparison done in CCI-001891. DoD-approved solutions consist of a combination of a primary and secondary time source using a combination or multiple instances of the following: a time server designated for the appropriate DoD network (NIPRNet/SIPRNet); United States Naval Observatory (USNO) time servers; and/or the Global Positioning System (GPS). The secondary time source must be located in a different geographic region than the primary time source.
Checks: C-63689r1_chk

Verify that RiOS is configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions. Navigate to the device CLI Type: enable Type: show ntp all Verify that at least two NTP Servers are configured -- or -- Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; Date and Time Verify that at least two servers are configured in the section "Requested Servers" If no NTP Servers are visible after the command 'show ntp all' or on "Requested Servers", this is a finding.

Fix: F-68855r1_fix

Configure RiOS to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions. Navigate to the device CLI Type: enable Type: conf t Type: ntp server <hostname | ip address> Type: ntp server <hostname | ip address> enable Configure 2 NTP Servers Type: ntp enable Type: write memory -- or -- Navigate to the device Management Console Navigate to Configure >> System Settings >> Date and Time Click "Add a New NTP Server" Set the value of "Hostname or IP Address" to the required NTP Server Set the value of "Enabled/Disabled" to "Enabled" Click "Add" Configure 2 NTP Servers Click "Use NTP Time Synchronization" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must generate a log event for the enforcement actions used to restrict access associated with changes to the device.
CM-5 - Medium - CCI-001814 - V-62939 - SV-77429r1_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001814
Version
RICX-DM-000085
Vuln IDs
  • V-62939
Rule IDs
  • SV-77429r1_rule
Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to identify attempted attacks, and an audit trail will not be available for forensic investigation for after-the-fact actions. Enforcement actions are the methods or mechanisms used to prevent unauthorized changes to configuration settings. Enforcement action methods may be as simple as denying access to a file based on the application of file permissions (access restriction). Audit items may consist of lists of actions blocked by access restrictions or changes identified after the fact. For RiOS, all configuration changes authorized or unauthorized are logged in the system logs. Log entries include the user that initiated the configuration change for accountability.
Checks: C-63691r1_chk

Verify that RiOS is configured to audit the enforcement actions used to restrict access associated with changes to the device. Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; Logging Verify that "Minimum Severity" is set to "info" If the minimum severity is not set to "info", this is a finding.

Fix: F-68857r1_fix

Configure RiOS to audit the enforcement actions used to restrict access associated with changes to the device. Navigate to the device Management Console Navigate to Configure >> System Settings >> Logging Set "Minimum Severity" to "info" Click "Apply" Navigate to the top of the screen and click "Save"

b
Riverbed Optimization System (RiOS) must enable the password authentication control policy to ensure password complexity controls and other password policy requirements are enforced.
CM-6 - Medium - CCI-000366 - V-62941 - SV-77431r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
RICX-DM-000091
Vuln IDs
  • V-62941
Rule IDs
  • SV-77431r1_rule
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks.
Checks: C-63693r1_chk

Verify authentication policy is enabled. Navigate to the device Management Console Navigate to: Configure &gt;&gt; Security &gt;&gt; Password Policy Verify the "Enable Account Control" is selected If "Enable Account Control" is not set, this is a finding.

Fix: F-68859r1_fix

Enable RiOS authentication policy. Navigate to the device Management Console, then Navigate to: Configure >> Security >> Password Policy Select "Enable Account Control" Set values for the user account Click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally manage authentication settings.
CM-6 - Medium - CCI-000366 - V-62943 - SV-77433r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
RICX-DM-000092
Vuln IDs
  • V-62943
Rule IDs
  • SV-77433r1_rule
The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible. Without centralized management, it is likely that credentials for some network devices will be forgotten, leading to delays in administration, which itself leads to delays in remediating production problems and in addressing compromises in a timely fashion.
Checks: C-63695r1_chk

Verify that RiOS is configured to employ automated mechanisms to centrally manage authentication settings. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; TACACS+ Verify that "TACACS+ Servers" has at least one server defined -- or -- Navigate to Configure &gt;&gt; Security &gt;&gt; RADIUS Verify that "RADIUS Servers" has at least one server defined If no servers exist in "TACACS+ Servers" or "RADIUS Servers", this is a finding.

Fix: F-68861r1_fix

Configure RiOS to employ automated mechanisms to centrally manage authentication settings. Navigate to the device Management Console Navigate to Configure >> Security >> TACACS+ Click "Add a TACACS+ Server" Set "Hostname or IP Address" to the hostname or IP address of the TACACS+ server Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently -- or -- Navigate to Configure >> Security >> RADIUS Click "Add a RADIUS Server" Set "Hostname or IP Address" to the hostname or IP address of the RADIUS server Set the value of "Authentication Port" to the appropriate value Set the value of "Authentication Type" to "CHAP" Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally apply authentication settings.
CM-6 - Medium - CCI-000366 - V-62945 - SV-77435r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
RICX-DM-000093
Vuln IDs
  • V-62945
Rule IDs
  • SV-77435r1_rule
The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible. Without centralized management, it is likely that credentials for some network devices will be forgotten, leading to delays in administration, which itself leads to delays in remediating production problems and in addressing compromises in a timely fashion.
Checks: C-63697r1_chk

Verify that RiOS is configured to employ automated mechanisms to centrally apply authentication settings. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; TACACS+ Verify that "TACACS+ Servers" has at least one server defined -- or -- Navigate to Configure &gt;&gt; Security &gt;&gt; RADIUS Verify that "RADIUS Servers" has at least one server defined If no servers exist in "TACACS+ Servers" or "RADIUS Servers", this is a finding.

Fix: F-68863r1_fix

Configure RiOS to employ automated mechanisms to centrally apply authentication settings. Navigate to the device Management Console Navigate to Configure >> Security >> TACACS+ Click "Add a TACACS+ Server" Set "Hostname or IP Address" to the hostname or IP address of the TACACS+ server Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently. -- or -- Navigate to Configure >> Security >> RADIUS Click "Add a RADIUS Server" Set "Hostname or IP Address" to the hostname or IP address of the RADIUS server Set the value of "Authentication Port" to the appropriate value Set the value of "Authentication Type" to "CHAP" Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must employ automated mechanisms to centrally verify authentication settings.
CM-6 - Medium - CCI-000366 - V-62947 - SV-77437r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
RICX-DM-000094
Vuln IDs
  • V-62947
Rule IDs
  • SV-77437r1_rule
The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible. Without centralized management, it is likely that credentials for some network devices will be forgotten, leading to delays in administration, which itself leads to delays in remediating production problems and in addressing compromises in a timely fashion.
Checks: C-63699r1_chk

Verify that RiOS is configured to employ automated mechanisms to centrally verify authentication settings. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; TACACS+ Verify that "TACACS+ Servers" has at least one server defined -- or -- Navigate to Configure &gt;&gt; Security &gt;&gt; RADIUS Verify that "RADIUS Servers" has at least one server defined If no servers exist in "TACACS+ Servers" or "RADIUS Servers", this is a finding.

Fix: F-68865r1_fix

Configure RiOS to employ automated mechanisms to centrally verify authentication settings. Navigate to the device Management Console Navigate to Configure >> Security >> TACACS+ Click "Add a TACACS+ Server" Set "Hostname or IP Address" to the hostname or IP address of the TACACS+ server Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently -- or -- Navigate to Configure >> Security >> RADIUS Click "Add a RADIUS Server" Set "Hostname or IP Address" to the hostname or IP address of the RADIUS server Set the value of "Authentication Port" to the appropriate value Set the value of "Authentication Type" to "CHAP" Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
CM-7 - Medium - CCI-000382 - V-62949 - SV-77439r1_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000382
Version
RICX-DM-000096
Vuln IDs
  • V-62949
Rule IDs
  • SV-77439r1_rule
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable unused or unnecessary physical and logical ports/protocols on information systems. Network devices are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Additionally, it is sometimes convenient to provide multiple services from a single component (e.g., email and web services); however, doing so increases risk over limiting the services provided by any one component. To support the requirements and principles of least functionality, the network device must support the organizational requirements providing only essential capabilities and limiting the use of ports, protocols, and/or services to only those required, authorized, and approved to conduct official business or to address authorized quality of life issues.
Checks: C-63701r1_chk

Verify that RiOS is configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Management ACL Verify that this page contains all unnecessary and/or nonsecure functional, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments. Verify that "Enable Management ACL" is checked. If no PPSM CAL or vulnerability assessment information is presented on this page or "Enable Management ACL" is not checked, this is a finding.

Fix: F-68867r1_fix

Configure RiOS to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services , as defined in the PPSM CAL and vulnerability assessments. Navigate to the device Management Console Navigate to Configure >> Security >> Management ACL Click "Add a New Rule" Set the values in "Management ACL Settings" to match requirements defined in the PPSM CAL and vulnerability assessments Check the field "Enable Management ACL" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must back up the system configuration files when configuration changes are made to the device.
CM-6 - Medium - CCI-000366 - V-62951 - SV-77441r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
RICX-DM-000100
Vuln IDs
  • V-62951
Rule IDs
  • SV-77441r1_rule
Information system backup is a critical step in maintaining data assurance and availability. Information system and security-related documentation contains information pertaining to system configuration and security settings. If this information were not backed up, and a system failure were to occur, the security settings would be difficult to reconfigure quickly and accurately. Maintaining a backup of information system and security-related documentation provides for a quicker recovery time when system outages occur. This control requires the network device to support the organizational central backup process for user account information associated with the network device. This function may be provided by the network device itself; however, the preferred best practice is a centralized backup rather than each network device performing discrete backups.
Checks: C-63703r1_chk

Verify that RiOS is backed up when system configuration changes are made to the device by interviewing the site representative and checking any existing backup log. Evidence may also be provided by the date of the last back up. Navigate to the device Management Console Navigate to Configure &gt;&gt; Configurations Verify that the table for "Configuration" and "Date" contains backup configurations If there are no entries under "Configuration" and "Date", this is a finding.

Fix: F-68869r1_fix

When changes are made to the system configuration, using the following procedure for backing up the device. Navigate to the device Management Console Navigate to Configure >> Configurations Set the value of "New Configuration Name:" to the naming standards for the organization backups Click "Save" Verify that the saved configuration shows up under "Configuration" and the "Date" is the current date and time

b
Riverbed Optimization System (RiOS) must implement replay-resistant authentication mechanisms for network access to privileged accounts.
IA-2 - Medium - CCI-001941 - V-62953 - SV-77443r1_rule
RMF Control
IA-2
Severity
Medium
CCI
CCI-001941
Version
RICX-DM-000106
Vuln IDs
  • V-62953
Rule IDs
  • SV-77443r1_rule
A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be vulnerable to a replay attack. An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Techniques used to address this include protocols using nonces (e.g., numbers generated for a specific one-time use) or challenges (e.g., TLS, WS_Security). Additional techniques include time-synchronous or challenge-response one-time authenticators.
Checks: C-63705r1_chk

Verify that RiOS is configured to implement replay resistant authentication mechanisms for network access to privileged accounts. Navigate to the device CLI Type: enable Type: show config full Type: Spacebar to tab through the configuration Verify that the following commands are contained in the configuration "no web http enable" "web https enable" "no web ssl protocol sslv3" "no web ssl protocol tlsv1" "web ssl protocol tlsv1.1" "web ssl protocol tlsv1.2" If all of the above configurations are not defined as listed, this is a finding.

Fix: F-68871r1_fix

Configure RiOS to implement replay resistant authentication mechanisms for network access to privileged accounts. Navigate to the device CLI Type: enable Type: conf t Type: no web http enable Type: web https enable Type: no web ssl protocol sslv3 Type: no web ssl protocol tlsv1 Type: web ssl protocol tlsv1.1 Type: web ssl protocol tlsv1.2 Type: write memory Type: exit Type: exit

b
Riverbed Optimization System (RiOS) must authenticate network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
IA-3 - Medium - CCI-001967 - V-62955 - SV-77445r1_rule
RMF Control
IA-3
Severity
Medium
CCI
CCI-001967
Version
RICX-DM-000109
Vuln IDs
  • V-62955
Rule IDs
  • SV-77445r1_rule
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are of greater risk. A local connection is any connection with a device communicating without the use of a network. A network connection is any connection with a device that communicates through a network (e.g., local area or wide area network, Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Because of the challenges of applying this requirement on a large scale, organizations are encouraged to only apply the requirement to those limited number (and type) of devices that truly need to support this capability. For network device management, this has been determined to be network management device addresses, SNMP authentication, and NTP authentication.
Checks: C-63707r1_chk

Verify that RiOS is configured to authenticate network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (network management portion of the requirement). Navigate to the device CLI Type: enable Type: show configuration full Verify that 'no telnet-server enable' is in the configuration Verify that 'ssh server enable' is set in the configuration Verify that 'web enable' is in the configuration Verify that 'no web http enable' is in the configuration Verify that 'web https enable' is in the configuration If any one of the above settings is missing from the configuration, this is a finding.

Fix: F-68873r1_fix

Configure RiOS to Authenticate network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (network management portion of the requirement). Navigate to the device CLI Type: enable Type: config t Type: no telnet-server enable Type: ssh server enable Type: ssh server allowed-cyphers aes128-cbc, 3des-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr Type: web enable Type: no web http enable Type: web https enable Type: write memory Type: exit Type: exit

b
Riverbed Optimization System (RiOS) must authenticate SNMP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
IA-3 - Medium - CCI-001967 - V-62957 - SV-77447r1_rule
RMF Control
IA-3
Severity
Medium
CCI
CCI-001967
Version
RICX-DM-000110
Vuln IDs
  • V-62957
Rule IDs
  • SV-77447r1_rule
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are of greater risk. A local connection is any connection with a device communicating without the use of a network. A network connection is any connection with a device that communicates through a network (e.g., local area or wide area network, Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Because of the challenges of applying this requirement on a large scale, organizations are encouraged to only apply the requirement to those limited number (and type) of devices that truly need to support this capability. For network device management, this has been determined to be network management device addresses, SNMP authentication, and NTP authentication.
Checks: C-63709r1_chk

Verify that RiOS is configured to authenticate SNMP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (SNMP portion of the requirement). Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; SNMP Basic Verify that at least one "Host" is defined under "Trap Receivers" Verify that the "Host" defined under "Trap Receivers" is set for "Version" v3 Verify that "Enable SNMP Traps" is set If no "Host" exists under "Trap Receivers or the "Host" is not "Version" v3 and/or "Enable SNMP Traps" is not set, this is a finding.

Fix: F-68875r1_fix

Configure RiOS to authenticate SNMP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (SNMP portion of the requirement). Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver" to the IP address of the trap receiver Set "Destination Port" to the listening port on the trap receiver Set "Receiver Type" to v3 Set "Remote User" to the SNMP user on the trap receiver Set "Authentication" to "Supply a Key" Set "Authentication Protocol" to "MD5" or "SHA" Set "Security Level" to "AuthPriv" Set "Privacy Protocol" to "AES" Set "Privacy" to "Same as Authentication Key" Set "MD5/SHA Key" to the proper authentication key Set "Enable Receiver" Click "Add" Click "Enable SNMP Traps" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently.

b
Riverbed Optimization System (RiOS) must authenticate NTP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
IA-3 - Medium - CCI-001967 - V-62959 - SV-77449r1_rule
RMF Control
IA-3
Severity
Medium
CCI
CCI-001967
Version
RICX-DM-000111
Vuln IDs
  • V-62959
Rule IDs
  • SV-77449r1_rule
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are of greater risk. A local connection is any connection with a device communicating without the use of a network. A network connection is any connection with a device that communicates through a network (e.g., local area or wide area network, Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Because of the challenges of applying this requirement on a large scale, organizations are encouraged to only apply the requirement to those limited number (and type) of devices that truly need to support this capability. For network device management, this has been determined to be network management device addresses, SNMP authentication, and NTP authentication.
Checks: C-63711r1_chk

Verify that RiOS is configured to authenticate NTP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (NTP portion of the requirement). Navigate to the device CLI Type: enable Type: show ntp all Verify that at least two NTP Servers are configured Type: show ntp authentication Verify the "Trusted Keys" are defined for use with NTP -- or -- Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; Date and Time Verify that at least two servers are configured in the section "Requested Servers" If no NTP Servers are visible after the command 'show ntp all' or on "Requested Servers", this is a finding.

Fix: F-68877r1_fix

Configure RiOS to authenticate NTP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (NTP portion of the requirement). Navigate to the device CLI Type: enable Type: conf t Type: ntp server <hostname | ip address> Type: ntp server <hostname | ip address> Type: ntp authentication key <key id> secret 7 <encrypted string> Type: ntp authentication trustedkeys <key id> Configure 2 NTP Servers Type: ntp enable Type: write memory -- or -- Navigate to the device Management Console Navigate to Configure >> System Settings >> Date and Time Click "Add a New NTP Authentication Key" Set the value of "Key ID" to the required setting (1 to 65534) Set the value of "Key Type" to MD5 or SHA Set the value of "Secret" to the required setting for the NTP server Click "Add" Click '"Add" a New NTP Server' Set the value of "Hostname or IP Address" to the required NTP Server Set the value of "Version" to 3 or 4 depending on the ntp server Set the value of "Key ID" to a value on the trusted key list Set the value of "Enabled/Disabled" to "Enabled" Click "Add" Configure 2 NTP Servers Click "Use NTP Time Synchronization" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must enforce a minimum 15-character password length.
IA-5 - Medium - CCI-000205 - V-62961 - SV-77451r1_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000205
Version
RICX-DM-000114
Vuln IDs
  • V-62961
Rule IDs
  • SV-77451r1_rule
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to determine strength and how long it takes to crack a password. The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Use of more characters in a password helps to exponentially increase the time and/or resources required to compromise the password.
Checks: C-63713r1_chk

Verify that RiOS is configured to enforce a minimum 15-character password length. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Password Policy Verify that "Minimum Password Length:" is set to "15" If "Minimum Password Length:" is not set to "15", this is a finding.

Fix: F-68879r1_fix

Configure RiOS to enforce a minimum 15-character password length. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Password Length:" to "15" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must enforce password complexity by requiring that at least one upper-case character be used.
IA-5 - Medium - CCI-000192 - V-62963 - SV-77453r1_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000192
Version
RICX-DM-000115
Vuln IDs
  • V-62963
Rule IDs
  • SV-77453r1_rule
Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised.
Checks: C-63715r1_chk

Verify that RiOS is configured to enforce password complexity that requires at least one upper-case character. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security&gt;Password Policy Verify that "Minimum Uppercase Characters:" is set to "1" If "Minimum Uppercase Characters:" is not set to "1", this is a finding.

Fix: F-68881r1_fix

Configure RiOS to enforce a password complexity that requires at least one upper-case character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Uppercase Characters:" to "1" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must enforce password complexity by requiring that at least one lower-case character be used.
IA-5 - Medium - CCI-000193 - V-62965 - SV-77455r1_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000193
Version
RICX-DM-000116
Vuln IDs
  • V-62965
Rule IDs
  • SV-77455r1_rule
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised.
Checks: C-63717r1_chk

Verify that RiOS is configured to enforce password complexity that requires at least one lower-case character. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Password Policy Verify that "Minimum Lowercase Characters:" is set to "1" If "Minimum Lowercase Characters:" is not set to "1", this is a finding.

Fix: F-68883r1_fix

Configure RiOS to enforce a password complexity that requires at least one lower-case character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Lowercase Characters:" to "1" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must enforce password complexity by requiring that at least one numeric character be used.
IA-5 - Medium - CCI-000194 - V-62967 - SV-77457r1_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000194
Version
RICX-DM-000117
Vuln IDs
  • V-62967
Rule IDs
  • SV-77457r1_rule
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised.
Checks: C-63719r1_chk

Verify that RiOS is configured to enforce password complexity that requires at least one numeric character. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Password Policy Verify that "Minimum Numerical Characters:" is set to "1" If "Minimum Numerical Characters:" is not set to "1", this is a finding.

Fix: F-68885r1_fix

Configure RiOS to enforce a password complexity that requires at least one numerical character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Numerical Characters:" to "1" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must enforce password complexity by requiring that at least one numeric character be used.
IA-5 - Medium - CCI-001619 - V-62969 - SV-77459r1_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-001619
Version
RICX-DM-000118
Vuln IDs
  • V-62969
Rule IDs
  • SV-77459r1_rule
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised.
Checks: C-63721r1_chk

Verify that RiOS is configured to enforce password complexity that requires at least one special character. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Password Policy Verify that "Minimum Special Characters:" is set to "1" If "Minimum Special Characters:" is not set to "1", this is a finding.

Fix: F-68887r1_fix

Configure RiOS to enforce a password complexity that requires at least one special character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Special Characters:" to "1" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must require that when a password is changed, the characters are changed in at least 15 of the positions within the password.
IA-5 - Medium - CCI-000195 - V-62971 - SV-77461r1_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000195
Version
RICX-DM-000119
Vuln IDs
  • V-62971
Rule IDs
  • SV-77461r1_rule
If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at guessing and brute-force attacks. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. In other words, characters may be the same within the two passwords; however, the positions of the like characters must be different.
Checks: C-63723r1_chk

Verify that RiOS is configured to require that when a password is changed, the characters are changed in at least 15 of the positions within the password. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Password Policy Verify that "Minimum Character Difference Between Passwords:" is set to "15" If "Minimum Character Difference Between Passwords:" is not set to "15", this is a finding.

Fix: F-68889r1_fix

Configure RiOS to require that when a password is changed, the characters are changed in at least 15 of the positions within the password. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Character Difference Between Passwords:" to "15" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must enforce a 60-day maximum password lifetime restriction.
IA-5 - Medium - CCI-000199 - V-62973 - SV-77463r1_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000199
Version
RICX-DM-000123
Vuln IDs
  • V-62973
Rule IDs
  • SV-77463r1_rule
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals. One method of minimizing this risk is to use complex passwords and periodically change them. If the network device does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the passwords could be compromised. This requirement does not include emergency administration accounts which are meant for access to the network device in case of failure. These accounts are not required to have maximum password lifetime restrictions.
Checks: C-63725r1_chk

Verify that RiOS is configured to enforce a 60-day maximum password lifetime restriction. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Password Policy Verify that "Days Before Password Expires:" is set to "60" If "Days Before Password Expires:" is not set to "60", this is a finding.

Fix: F-68891r1_fix

Configure RiOS to enforce a 60-day maximum password lifetime. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Days Before Password Expires:" to "60" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must prohibit password reuse for a minimum of five generations.
IA-5 - Medium - CCI-000200 - V-62975 - SV-77465r1_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000200
Version
RICX-DM-000124
Vuln IDs
  • V-62975
Rule IDs
  • SV-77465r1_rule
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the network device allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.
Checks: C-63727r1_chk

Verify that RiOS is configured to prohibit password reuse for a minimum of five generations. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Password Policy Verify that "Minimum Interval for Password Reuse:" is set to "5" If "Minimum Interval for Password Reuse:" is not set to "5", this is a finding.

Fix: F-68893r1_fix

Configure RiOS to prohibit password reuse for a minimum of five generations. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Interval for Password Reuse:" to "5" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
IA-7 - Medium - CCI-000803 - V-62977 - SV-77467r1_rule
RMF Control
IA-7
Severity
Medium
CCI
CCI-000803
Version
RICX-DM-000130
Vuln IDs
  • V-62977
Rule IDs
  • SV-77467r1_rule
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromised. Network devices utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules. FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meets DoD requirements. Note that adding the FIPS 140-2 licenses incurs a cost from the vendor for support for FIPS mode/module.
Checks: C-63729r1_chk

Verify that RiOS is licensed to use FIPS 140-2 cryptographic modules. Navigate to the device CLI Type: enable Type: config t Type: show licenses Verify installation of a FIPS License Type: show web ssl cipher Verify that the web ssl cipher string is: "TLSv1.2+FIPS:kRSA+FIPS:!eNULL:!aNULL" If a FIPS license is not present and the web ssl cipher string is not set properly, this is a finding.

Fix: F-68895r1_fix

Configure RiOS to be licenses to use FIPS 140-2 cryptographic modules. Navigate to the device CLI Type: enable Type: config t Type: license install <license-string> Type: web ssl cipher TLSv1.2+FIPS:kRSA+FIPS:!eNULL:!aNULL Type: write memory Verify license installation Type: show licenses Type: show web ssl cipher

b
Riverbed Optimization System (RiOS) performing maintenance functions must restrict use of these functions to authorized personnel only.
CM-6 - Medium - CCI-000366 - V-62979 - SV-77469r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
RICX-DM-000133
Vuln IDs
  • V-62979
Rule IDs
  • SV-77469r1_rule
There are security-related issues arising from software brought into the network device specifically for diagnostic and repair actions (e.g., a software packet sniffer installed on a device in order to troubleshoot system traffic, or a vendor installing or running a diagnostic application in order to troubleshoot an issue with a vendor-supported device). If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the system. This requirement addresses security-related issues associated with maintenance tools used specifically for diagnostic and repair actions on organizational network devices. Maintenance tools can include hardware, software, and firmware items. Maintenance tools are potential vehicles for transporting malicious code, either intentionally or unintentionally, into a facility and subsequently into organizational information systems. Maintenance tools can include, for example, hardware/software diagnostic test equipment and hardware/software packet sniffers. This requirement does not cover hardware/software components that may support information system maintenance yet are a part of the system (e.g., the software implementing "ping," "ls," "ipconfig," or the hardware and software implementing the monitoring port of an Ethernet switch).
Checks: C-63731r1_chk

Verify that RiOS is configured so that performing maintenance functions is restricted to authorized personnel only. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; User Permissions Verify that only authorized personnel have the permissions to perform maintenance functions If user permissions for authorized personnel are not set to authorize maintenance functions, this is a finding.

Fix: F-68897r3_fix

Configure RiOS to restrict use of maintenance functions to authorized personnel only. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Click "Add New User Account" under "Role Based Accounts" Set User Permissions of authorized personnel to allow performance of maintenance functions Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Applications used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.
MA-4 - Medium - CCI-002890 - V-62981 - SV-77471r1_rule
RMF Control
MA-4
Severity
Medium
CCI
CCI-002890
Version
RICX-DM-000134
Vuln IDs
  • V-62981
Rule IDs
  • SV-77471r1_rule
This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to manipulation, potentially allowing alteration and hijacking of maintenance sessions.
Checks: C-63733r1_chk

Verify that RiOS is configured to implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. Navigate to the device CLI Type: enable Type: show configuration full Verify that "no telnet-server enable" is in the configuration Verify that "ssh server enable" is set in the configuration Verify that "web enable" is in the configuration Verify that "no web http enable" is in the configuration Verify that "web https enable" is in the configuration If any one of the above settings is missing from the configuration, this is a finding.

Fix: F-68899r1_fix

Configure RiOS to implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. Navigate to the device CLI Type: enable Type: config t Type: no telnet-server enable Type: ssh server enable Type: ssh server allowed-cyphers aes128-cbc, 3des-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr Type: web enable Type: no web http enable Type: web https enable Type: write memory Type: exit Type: exit

b
Applications used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.
MA-4 - Medium - CCI-003123 - V-62983 - SV-77473r1_rule
RMF Control
MA-4
Severity
Medium
CCI
CCI-003123
Version
RICX-DM-000135
Vuln IDs
  • V-62983
Rule IDs
  • SV-77473r1_rule
This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to eavesdropping, potentially putting sensitive data (including administrator passwords) at risk of compromise and potentially allowing hijacking of maintenance sessions.
Checks: C-63735r1_chk

Verify that RiOS is configured to implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. Navigate to the device CLI Type: enable Type: show configuration full Verify that "no telnet-server enable" is in the configuration Verify that "ssh server enable" is set in the configuration Verify that "web enable" is in the configuration Verify that "no web http enable" is in the configuration Verify that "web https enable" is in the configuration If any one of the above settings is missing from the configuration, this is a finding.

Fix: F-68901r1_fix

Configure RiOS to implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. Navigate to the device CLI Type: enable Type: config t Type: no telnet-server enable Type: ssh server enable Type: ssh server allowed-cyphers aes128-cbc, 3des-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr Type: web enable Type: no web http enable Type: web https enable Type: write memory Type: exit Type: exit

b
Riverbed Optimization System (RiOS) must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
SC-10 - Medium - CCI-001133 - V-62985 - SV-77475r1_rule
RMF Control
SC-10
Severity
Medium
CCI
CCI-001133
Version
RICX-DM-000137
Vuln IDs
  • V-62985
Rule IDs
  • SV-77475r1_rule
Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unattended. In addition, quickly terminating an idle session will also free up resources committed by the managed network element. Terminating network connections associated with communications sessions includes, for example, de-allocating associated TCP/IP address/port pairs at the operating system level, or de-allocating networking assignments at the application level if multiple application sessions are using a single, operating system-level network connection. This does not mean that the device terminates all sessions or network access; it only ends the inactive session and releases the resources associated with that session.
Checks: C-63737r1_chk

Verify that RiOS is configured to terminate a device management session at the end of the session, or after 10 minutes of inactivity. Navigate to the device CLI Type: enable Type: show web Verify that "Inactivity Timeout:" is set to "10" minutes -- or -- Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Web Settings Verify that "Web Inactivity Timeout (minutes):" is set to "10" If "Inactivity Timeout" or "Web Inactivity Timeout (minutes)" is not set to "10", this is a finding.

Fix: F-68903r1_fix

Configure RiOS to terminate a device management session at the end of the session, or after 10 minutes of inactivity. Navigate to the device CLI Type: enable Type: conf t Type: web auto-logout 10 Type: write memory -- or -- Navigate to the device Management Console Navigate to Configure >> Security >> Web Settings Set the value of "Web Inactivity Timeout (minutes):" to "10" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
CM-6 - Medium - CCI-000366 - V-62987 - SV-77477r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
RICX-DM-000138
Vuln IDs
  • V-62987
Rule IDs
  • SV-77477r1_rule
For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority will suffice.
Checks: C-63739r1_chk

Verify that RiOS is configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider. Navigate to the device Management Console Navigate to Configure &gt;&gt; Optimization &gt;&gt; Certificate Authorities Verify that DoD Root Certificates are listed on this page If no DoD Root CA Certificates are listed on this page, this is a finding.

Fix: F-68905r1_fix

Configure RiOS to use public key certificates from an appropriate certificate policy through an approved service provider. Navigate to the device Management Console Navigate to Configure >> Optimization >> Certificate Authorities Click "Add a New Certificate Authority" Select "Local File" and "Browse" Navigate to your local DoD CA Root Certificates and select a certificate Click "Add" Repeat Click "Add a New Certificate Authority" down to Click "Add" for each DoD Root Certificate Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must generate unique session identifiers using a FIPS 140-2 approved random number generator.
SC-23 - Medium - CCI-001188 - V-62989 - SV-77479r1_rule
RMF Control
SC-23
Severity
Medium
CCI
CCI-001188
Version
RICX-DM-000141
Vuln IDs
  • V-62989
Rule IDs
  • SV-77479r1_rule
Sequentially generated session IDs can be easily guessed by an attacker. Employing the concept of randomness in the generation of unique session identifiers helps to protect against brute-force attacks to determine future session identifiers. Unique session IDs address man-in-the-middle attacks, including session hijacking or insertion of false information into a session. If the attacker is unable to identify or guess the session information related to pending application traffic, they will have more difficulty in hijacking the session or otherwise manipulating valid sessions. This requirement is applicable to devices that use a web interface for device management. Recommended best practice is that the FIPS license be installed and utilized.
Checks: C-63741r1_chk

Verify that RiOS is configured to generate unique session identifiers using a FIPS 140-2 approved random number generator. Navigate to the device CLI Type: enable Type: conf t Type: show fips status Verify that "FIPS Mode: Enabled" is displayed on the console If "FIPS Mode: Enabled" is not displayed on the console, this is a finding.

Fix: F-68907r1_fix

Configure RiOS is configured to generate unique session identifiers using a FIPS 140-2 approved random number generator. Navigate to the device CLI Type: enable Type: conf t Type: fips enable Type: write memory Type: reload Type: show fips status Verify that "FIPS Mode: Enabled" is displayed on the screen. Type: exit Type: exit

b
Riverbed Optimization System (RiOS) must protect against or limit the effects of all known types of Denial of Service (DoS) attacks on the network device management network by employing organization-defined security safeguards.
SC-5 - Medium - CCI-002385 - V-62991 - SV-77481r1_rule
RMF Control
SC-5
Severity
Medium
CCI
CCI-002385
Version
RICX-DM-000143
Vuln IDs
  • V-62991
Rule IDs
  • SV-77481r1_rule
DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This requirement addresses the configuration of network devices to mitigate the impact of DoS attacks that have occurred or are ongoing on device availability. For each network device, known and potential DoS attacks must be identified and solutions for each type implemented. A variety of technologies exist to limit or, in some cases, eliminate the effects of DoS attacks (e.g., limiting processes or restricting the number of sessions the device opens at one time). Employing increased capacity and bandwidth, combined with service redundancy, may reduce the susceptibility to some DoS attacks. The security safeguards cannot be defined at the DoD level because they vary according to the capabilities of the individual network devices and the security controls applied on the adjacent networks (for example, firewalls performing packet filtering to block DoS attacks).
Checks: C-63743r1_chk

Verify that RIOS is configured to protect against or limit the effects of all know types of Denial of Service (DoS) attacks on the device management network. Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; Management ACL Verify that there is a rule to limit management access from authorized devices and that the interface is set to other than an in-path interface Verify that "Enable Management ACL" is checked If Management ACLs are not defined to limit access to identified or known devices and/or a management interface is not defined that is different from the in-path interface and/or "Enable Management ACL" is not checked, this is a finding.

Fix: F-68909r1_fix

Configure RiOS to protect against or limit the effects of all known types of Denial of Service (DoS) attacks on the network device management network. Navigate to the device Management Console Navigate to Configure >> Security >> Management ACL Click "Add a New Rule" Set "Action" to "Allow" Set "Service" to "HTTPS" Set "Source Network" to Management device network Set "Interface" to the interface used for network management Set "Description" to enable ease of management Click "Add" Click "Add a New Rule" and repeat all actions for SSH Click "Enable Management ACL" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently

b
Riverbed Optimization System (RiOS) must generate an alert that can be sent to security personnel when threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B occur.
CM-6 - Medium - CCI-000366 - V-62993 - SV-77483r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
RICX-DM-000144
Vuln IDs
  • V-62993
Rule IDs
  • SV-77483r1_rule
By immediately displaying an alarm message, potential security violations can be identified more quickly even when administrators are not logged into the network device. An example of a mechanism to facilitate this would be through the utilization of SNMP traps.
Checks: C-63745r1_chk

Verify that RiOS uses automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure &gt;&gt; System Settings &gt;&gt; SNMP Basic Verify that Host Servers are defined in the section "Trap Receivers" If there are no Host Servers defined in "Trap Receivers", this is a finding.

Fix: F-68911r1_fix

Configure RiOS to use automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver IP Address" to the address of the trap receiver Set "Destination Port:" to the port that the Trap Receiver is listening on Set "Receiver Type:" to "v3" Set "Remote User:" to the user name on the Trap Receiver Set "Authentication:" to <Supply a key based> Set "Authentication Protocol:" to "SHA" SHA Key: <enter the SHA key> Set "Security Level:" to "Auth/Priv" Set "Privacy Protocol:" to "AES" Set "Privacy:" to Select "same as Authentication Key" Set "Enable Receiver" Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently

b
The application must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
SI-11 - Medium - CCI-001314 - V-62995 - SV-77485r1_rule
RMF Control
SI-11
Severity
Medium
CCI
CCI-001314
Version
RICX-DM-000145
Vuln IDs
  • V-62995
Rule IDs
  • SV-77485r1_rule
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state. Additionally, sensitive account information must not be revealed through error messages to unauthorized personnel or their designated representatives.
Checks: C-63747r1_chk

Verify that RiOS is configured to reveal error messages only to authorized individuals (ISSO, ISSM, and SA). Navigate to the device Management Console Navigate to Configure &gt;&gt; Security &gt;&gt; User Permissions Select the view icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.

Fix: F-68913r1_fix

Configure RiOS to reveal error messages only to authorized individuals (ISSO, ISSM, and SA). Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory