Arista MLS DCS-7000 Series NDM Security Technical Implementation Guide

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]

Details

Version / Release: V1R3

Published: 2019-09-30

Updated At: 2019-11-11 10:44:38

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-75271r1_rule AMLS-NM-000100 CCI-000366 HIGH The Arista Multilayer Switch must have a local infrequently used account to be used as an account of last resort with full access to the network device. Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password c
    SV-75289r1_rule AMLS-NM-000110 CCI-000205 MEDIUM The Arista Multilayer Switch account of last resort must have a password with a length of 15 characters. Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password c
    SV-75291r1_rule AMLS-NM-000120 CCI-000018 MEDIUM The Arista Multilayer Switch must automatically audit account creation. Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. Notification of account creation helps to mitigate this risk. Audi
    SV-75293r1_rule AMLS-NM-000130 CCI-001403 MEDIUM The Arista Multilayer Switch must automatically audit account modification. Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security of the network device. Account management by a designated authority ensures access to the network device is being controlled in a
    SV-75295r1_rule AMLS-NM-000140 CCI-001404 MEDIUM The Arista Multilayer Switch must automatically audit account disabling actions. Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account disabling actions will support account management procedures. When device managem
    SV-75297r1_rule AMLS-NM-000150 CCI-001405 MEDIUM The Arista Multilayer Switch must automatically audit account removal actions. Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will support account management procedures. When device managemen
    SV-75299r1_rule AMLS-NM-000160 CCI-000048 MEDIUM The Arista Multilayer Switch must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device. Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, a
    SV-75301r1_rule AMLS-NM-000170 CCI-000166 LOW The Arista Multilayer Switch must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. This requirement supports non-repudiation of actions taken by an administrator and is required in order to maintain the integrity of the configuration management process. All configuration changes to the network device are logged, and administrators authe
    SV-75303r1_rule AMLS-NM-000180 CCI-000172 LOW The Arista Multilayer Switch must generate audit records when successful/unsuccessful attempts to access privileges occur. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit reco
    SV-75305r1_rule AMLS-NM-000190 CCI-000130 LOW The Arista Multilayer Switch must produce audit log records containing sufficient information to establish what type of event occurred. It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done in order to compile an accurate risk assessment. Associating event types with detected events in the applic
    SV-75307r1_rule AMLS-NM-000200 CCI-000135 LOW The Arista Multilayer Switch must generate audit records containing the full-text recording of privileged commands. Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requ
    SV-75309r1_rule AMLS-NM-000210 CCI-000382 MEDIUM The Arista Multilayer Switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable unused or unnecessary physical and logical ports/protocol
    SV-75311r1_rule AMLS-NM-000220 CCI-000767 MEDIUM The Arista Multilayer Switch must use multifactor authentication for local access to privileged accounts. Multifactor authentication is defined as: using two or more factors to achieve authentication. Factors include: (i) Something a user knows (e.g., password/PIN); (ii) Something a user has (e.g., cryptographic identification device, token); or (iii) Som
    SV-75315r1_rule AMLS-NM-000240 CCI-001133 MEDIUM The Arista Multilayer Switch must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements. Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unattended. In addition, quickly terminat
    SV-75317r1_rule AMLS-NM-000250 CCI-001314 MEDIUM The Arista Multilayer Switch must reveal error messages only to authorized individuals (ISSO, ISSM, and SA). Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state. Additionally, sensitive account information must not be revealed through error messages to unauthori
    SV-75319r1_rule AMLS-NM-000260 CCI-000366 MEDIUM The Arista Multilayer Switch must activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected. Predictable failure prevention requires organizational planning to address device failure issues. If components key to maintaining the device's security fail to function, the device could continue operating in an insecure state. If appropriate actions are
    SV-75321r1_rule AMLS-NM-000270 CCI-002046 MEDIUM The Arista Multilayer Switch must synchronize internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period. Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events.
    SV-75323r1_rule AMLS-NM-000280 CCI-000366 MEDIUM The Arista Multilayer Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources. The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other functions. Multiple time sources provide redundancy by in
    SV-75325r1_rule AMLS-NM-000290 CCI-001890 MEDIUM The Arista Multilayer Switch must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Time is commonly expressed in Coordinated Universal Time (UTC
    SV-75327r1_rule AMLS-NM-000340 CCI-002890 MEDIUM Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP.
    SV-75329r1_rule AMLS-NM-000350 CCI-003123 MEDIUM Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP.
    SV-75331r1_rule AMLS-NM-000360 CCI-000172 MEDIUM The Arista Multilayer Switch must generate audit records for privileged activities or other system-level access. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit reco
    SV-75333r1_rule AMLS-NM-000370 CCI-000172 MEDIUM The Arista Multilayer Switch must generate audit records showing starting and ending time for administrator access to the system. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit reco
    SV-75335r1_rule AMLS-NM-000380 CCI-000172 MEDIUM The Arista Multilayer Switch must generate audit records when concurrent logons from different workstations occur. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit reco
    SV-75337r1_rule AMLS-NM-000390 CCI-000172 MEDIUM The Arista Multilayer Switch must generate audit records for all account creations, modifications, disabling, and termination events. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit reco
    SV-75339r1_rule AMLS-NM-000400 CCI-001851 MEDIUM The Arista Multilayer Switch must, at a minimum, off-load audit records for interconnected systems in real time. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    SV-75341r1_rule AMLS-NM-000420 CCI-000366 MEDIUM The Arista Multilayer Switch must protect the audit records of nonlocal accesses to privileged accounts and the execution of privileged functions. Auditing may not be reliable when performed by the network device to which the user being audited has privileged access. The privileged user may inhibit auditing or modify audit records. This control enhancement helps mitigate this risk by requiring that
    SV-75343r2_rule AMLS-NM-000430 CCI-000366 HIGH The Arista Multilayer Switch must employ AAA service to centrally manage authentication settings. The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrator accounts for daily usage on each network device without
    SV-75345r1_rule AMLS-NM-000440 CCI-000366 LOW The Arista Multilayer Switch must support organizational requirements to conduct backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner. System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execution and operation of the device. Information system backu
    SV-81685r1_rule AMLS-NM-000500 CCI-000366 LOW The Arista Multilayer Switch must be updated to one of the minimum approved versions of EOS. The Arista Multilayer Switch uses the EOS operating system. Updates to EOS contain new security-related features and security patches that address known vulnerabilities. Running a current DoD-approved software version improves the security posture of the
    SV-81687r1_rule AMLS-NM-200825 CCI-000803 MEDIUM The Arista Multilayer Switch must use FIPS-compliant mechanisms for authentication to a cryptographic module. Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromised. Network devices utilizing encryption are req