Axonius Federal Systems Ax-OS Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- AXOS-00-000005
- Vuln IDs
-
- V-276001
- Rule IDs
-
- SV-276001r1122653_rule
Checks: C-80139r1122651_chk
From the Axonius Toolbox (accessed via Secure Shell [SSH]) Main Actions Menu, select the following options: Compliance Actions >> Advanced Compliance Actions >> Maximum Concurrent Logins If "Current Status: Disable" is shown, this is a finding.
Fix: F-80044r1122652_fix
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: Compliance Actions >> Advanced Compliance Actions >> Maximum Concurrent Logins >> Enable
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- AXOS-00-000010
- Vuln IDs
-
- V-276002
- Rule IDs
-
- SV-276002r1122656_rule
Checks: C-80140r1122654_chk
Select the gear icon (System Settings) >> Privacy and Security >> Session. Under the Session Menu, verify the "Enable session timeout" slide bar is enabled. Verify "Session idle timeout (minutes)" is set to "15". If "Session idle timeout (minutes)" is not set to 15 minutes or less, this is a finding.
Fix: F-80045r1122655_fix
Select the gear icon (System Settings) >> Privacy and Security >> Session. Under the Session Menu, enable the "Enable session timeout" slide bar. Set "Session idle timeout (minutes)" to "15". Click "Save".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- AXOS-00-000015
- Vuln IDs
-
- V-276003
- Rule IDs
-
- SV-276003r1122659_rule
Checks: C-80141r1122657_chk
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: Compliance Actions >> Advanced Compliance Actions >> Idle session timeout If "Idle session timeout" is not enabled, this is a finding.
Fix: F-80046r1122658_fix
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: Compliance Actions >> Advanced Compliance Actions >> Idle session timeout Enable "Idle session timeout".
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- AXOS-00-000020
- Vuln IDs
-
- V-276004
- Rule IDs
-
- SV-276004r1122662_rule
Checks: C-80142r1122660_chk
From the Axonius Toolbox (accessed via Secure Shell [SSH]) Main Actions Menu, select the following options: System Actions >> Advanced System Actions If "Enable FIPS Mode" is present, this is a finding.
Fix: F-80047r1122661_fix
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: System Actions >> Advanced System Actions >> Enable FIPS Mode If "Disable FIPS Mode" is displayed, no action is required.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- AXOS-00-000025
- Vuln IDs
-
- V-276005
- Rule IDs
-
- SV-276005r1122665_rule
Checks: C-80143r1122663_chk
Role-Based Access Control hierarchy is to be defined by the authorizing official (AO). Separation of duties must be configured. Select the gear icon (System Settings) >> Access Management >> LDAP & SAML. Depending on the multifactor type configured, under LDAP or SAML, locate "User Assignment Settings". If only one assigned role exists, this is a finding.
Fix: F-80048r1122664_fix
Role-Based Access Control hierarchy is to be defined by the AO. Separation of duties must be configured. Select the gear icon (System Settings) >> Access Management >> LDAP & SAML. Depending on the multifactor type configured, under LDAP or SAML, locate "User Assignment Settings". Assign two or more roles as defined by the AO and tie them to an LDAP/SAML user or group.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- AXOS-00-000030
- Vuln IDs
-
- V-276006
- Rule IDs
-
- SV-276006r1122668_rule
Checks: C-80144r1122666_chk
Select the gear icon (System Settings) >> GUI >> Login. Under Login Page Settings >> Custom message (up to 3000 characters), verify the Standard Mandatory DOD Notice and Consent Banner is displayed. If the banner is not displayed, this is a finding.
Fix: F-80049r1122667_fix
Select the gear icon (System Settings) >> GUI >> Login. Under Login Page Settings >> Custom message (up to 3000 characters), enter the Standard Mandatory DOD Notice and Consent Banner text. Click "Save".
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- AXOS-00-000035
- Vuln IDs
-
- V-276007
- Rule IDs
-
- SV-276007r1122671_rule
Checks: C-80145r1122669_chk
Access the Axonius Toolbox via Secure Shell (SSH) and verify the Standard Mandatory DOD Notice and Consent Banner is displayed. If the banner is not displayed, this is a finding.
Fix: F-80050r1122670_fix
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: Compliance Actions >> Advanced Compliance Actions >> Update SSH Banner Text Enter the Standard Mandatory DOD Notice and Consent Banner text.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AXOS-00-000040
- Vuln IDs
-
- V-276008
- Rule IDs
-
- SV-276008r1122674_rule
Checks: C-80146r1122672_chk
Select the gear icon (System Settings) >> Access Management >> External Password Managers. If the "Use Password Manager" slide bar is enabled, this is a finding.
Fix: F-80051r1122673_fix
Select the gear icon (System Settings) >> Access Management >> External Password Managers. Disable the "Use Password Manager" slide bar.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000765
- Version
- AXOS-00-000045
- Vuln IDs
-
- V-276009
- Rule IDs
-
- SV-276009r1122677_rule
Checks: C-80147r1122675_chk
Have the system administrator (SA) demonstrate accessing the Axonius Toolbox (accessed via Secure Shell [SSH]). Verify the SA is using a password-protected SSH key to log in to the system. If the SA is not using a password-protected SSH key to log in to the system, this is a finding.
Fix: F-80052r1122676_fix
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: System Actions >> Update customer account SSH key Follow the on-screen prompts to configure key-based authentication.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000765
- Version
- AXOS-00-000050
- Vuln IDs
-
- V-276010
- Rule IDs
-
- SV-276010r1122680_rule
Checks: C-80148r1122678_chk
Have the system administrator (SA) demonstrate logging in to the Axonius host via Secure File Transfer Protocol (SFTP). Verify the SA is using a password-protected Secure Shell (SSH) key to log in to the system. If the SA is not using a password-protected SSH key to log in to the system, this is a finding.
Fix: F-80053r1122679_fix
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: System Actions >> Update files account SSH key Follow the on-screen prompts to configure key-based authentication.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000766
- Version
- AXOS-00-000055
- Vuln IDs
-
- V-276011
- Rule IDs
-
- SV-276011r1123259_rule
Checks: C-80149r1122681_chk
Select the gear icon (System Settings) >> Access Management >> LDAP & SAML. Under LDAP & SAML, if the slide bar for "Allow LDAP Logins" or "Allow SAML Logins" is not selected, this is a finding. If the LDAP or SAML configuration does not point to an authentication source approved by the authorizing official (AO), this is a finding.
Fix: F-80054r1123238_fix
Select the gear icon (System Settings) >> Access Management >> LDAP & SAML. Under LDAP & SAML, enable either the slide bar for "Allow LDAP Logins" or the slide bar for "Allow SAML Logins". Configure the remaining fields for the environment.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000766
- Version
- AXOS-00-000060
- Vuln IDs
-
- V-276012
- Rule IDs
-
- SV-276012r1122686_rule
Checks: C-80150r1122684_chk
Role-Based Access Control hierarchy is to be defined by the authorizing official (AO). Separation of duties must be configured. Select the gear icon (System Settings) >> User and Role Management >> Users. In the list of users, verify the list is empty. If the list is not empty, this is a finding.
Fix: F-80055r1122685_fix
Role-Based Access Control hierarchy is to be defined by the AO. Separation of duties must be configured. Select the gear icon (System Settings) >> User and Role Management >> Users. After Lightweight Directory Access Protocol (LDAP)/Single Sign-On (SSO) has been configured, remove all local users.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001184
- Version
- AXOS-00-000065
- Vuln IDs
-
- V-276013
- Rule IDs
-
- SV-276013r1122689_rule
Checks: C-80151r1122687_chk
Select the gear icon (System Settings) >> Privacy and Security >> Certificate and Encryption. Under SSL Certificate, if the certificate has not been changed from the self-signed default certificate, unless otherwise approved by the authorizing official (AO), this is a finding. Under Certificate Verifications Settings, if "Use OCSP" is not selected, this is a finding. Under SSL Trust & CA Settings, if "Use custom certificate" is not selected and configured for a DOD PKI (or other AO-approved certificate), this is a finding. Under Mutual TLS Settings, if the "Enable mutual TLS" slide bar is not enabled, and the "Enforce client certificate validation" box is unchecked, this is a finding. Under Encryption Settings, if the "Allow legacy SSL cipher suites for adapters" is checked, this is a finding.
Fix: F-80056r1122688_fix
Select the gear icon (System Settings) >> Privacy and Security >> Certificate and Encryption. Under Certificate Verifications Settings, select "Use OCSP". Under SSL Trust & CA Settings, select "Use custom certificate" and configure for a DOD PKI (or other AO-approved certificate). Under Mutual TLS Settings, enable the "Enable mutual TLS" slide bar. Check the "Enforce client certificate validation" box. Under Encryption Settings, ensure the "Allow legacy SSL cipher suites for adapters" box is unchecked.
- RMF Control
- AU-4
- Severity
- H
- CCI
- CCI-001851
- Version
- AXOS-00-000070
- Vuln IDs
-
- V-276014
- Rule IDs
-
- SV-276014r1122692_rule
Checks: C-80152r1122690_chk
Select the gear icon (System Settings) >> External Integrations >> Syslog. Under the Syslog menu, if the "Use Syslog" slide bar is not selected, this is a finding. Under the Syslog menu, if "Syslog instance" has not been configured for an external log server(or otherwise proven Syslog is being captured by an external log server), this is a finding.
Fix: F-80057r1122691_fix
Select the gear icon (System Settings) >> External Integrations >> Syslog. Under the Syslog menu, enable "Use Syslog". Under the Syslog menu, configure "Syslog instance" for an external log server.
- RMF Control
- RA-5
- Severity
- M
- CCI
- CCI-001067
- Version
- AXOS-00-000075
- Vuln IDs
-
- V-276015
- Rule IDs
-
- SV-276015r1122695_rule
Checks: C-80153r1122693_chk
From the Axonius Toolbox (accessed via Secure Shell [SSH]) Main Actions Menu, select the following options: Compliance Actions >> Advanced Compliance Actions >> Update Tenable Scan Account Permissions Enter the scanning account username. If no scanning account has been set, this is a finding.
Fix: F-80058r1122694_fix
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: Compliance Actions >> Advanced Compliance Actions >> Add Tenable Scan Account Enter the username.
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- AXOS-00-000080
- Vuln IDs
-
- V-276016
- Rule IDs
-
- SV-276016r1123260_rule
Checks: C-80154r1123240_chk
From the Axonius Toolbox (accessed via Secure Shell [SSH]) Main Actions Menu, select the following options: System Actions >> Advanced System Actions >> NTP Sources If any NTP sources listed are not an authoritative time source approved by the authorizing official (AO), this is a finding.
Fix: F-80059r1123241_fix
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: System Actions >> Advanced System Actions >> Configure NTP Enter the hostname/IP of an AO-approved authoritative time source.