F5 BIG-IP Device Management Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- F5BI-DM-000003
- Vuln IDs
-
- V-217381
- V-60091
- Rule IDs
-
- SV-217381r879511_rule
- SV-74521
Checks: C-18606r290697_chk
Verify the BIG-IP appliance is configured to limit the number of concurrent sessions to 10 or an organization-defined number. Navigate to the BIG-IP System manager >> System >> Preferences. Set "System Settings:" to "Advanced". Verify "Maximum HTTP Connections to Configuration Utility" is set to the organization-defined number of concurrent sessions. If neither of these configurations is present, this is a finding.
Fix: F-18604r290698_fix
Configure the BIG-IP appliance either to limit the number of concurrent sessions to 10 or an organization-defined number.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- F5BI-DM-000019
- Vuln IDs
-
- V-217383
- V-60103
- Rule IDs
-
- SV-217383r879525_rule
- SV-74533
Checks: C-18608r290703_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that automatically audits account creation. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that automatically audits account creation. If the BIG-IP appliance is not configured to use a remote authentication server that automatically audits account creation, this is a finding.
Fix: F-18606r290704_fix
Configure the BIG-IP appliance to use an approved remote authentication server that automatically audits the creation of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- F5BI-DM-000021
- Vuln IDs
-
- V-217384
- V-60105
- Rule IDs
-
- SV-217384r879526_rule
- SV-74535
Checks: C-18609r290706_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that automatically audits account modifications. Verify the BIG-IP appliance is configured to utilize a properly configured authentication server. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured to use an approved remote authentication server that automatically audits account modification. If account modification is not automatically audited, this is a finding.
Fix: F-18607r290707_fix
Configure the BIG-IP appliance to use an approved authentication server that automatically audits account modifications.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- F5BI-DM-000023
- Vuln IDs
-
- V-217385
- V-60107
- Rule IDs
-
- SV-217385r879527_rule
- SV-74537
Checks: C-18610r290709_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that automatically audits account-disabling actions. Verify the BIG-IP appliance is configured to use a properly configured authentication server. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured to use an approved remote authentication server that automatically audits account-disabling actions. If account disabling is not automatically audited, this is a finding.
Fix: F-18608r290710_fix
Configure the BIG-IP appliance to use an approved authentication server that automatically audits account-disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- F5BI-DM-000025
- Vuln IDs
-
- V-217386
- V-60109
- Rule IDs
-
- SV-217386r879528_rule
- SV-74539
Checks: C-18611r290712_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that automatically audits account removal actions. Verify the BIG-IP appliance is configured to use a properly configured authentication server. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured to use an approved remote authentication server that automatically audits account removal actions. If account removal is not automatically audited, this is a finding.
Fix: F-18609r290713_fix
Configure the BIG-IP appliance to use an approved authentication server that automatically audits account removal actions.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- F5BI-DM-000027
- Vuln IDs
-
- V-217387
- V-60111
- Rule IDs
-
- SV-217387r879530_rule
- SV-74541
Checks: C-18612r290715_chk
Verify the BIG-IP appliance is configured to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device. Verify the BIG-IP appliance is configured to utilize a properly configured authentication server. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured to use an approved remote authentication server that enforces the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level. If the BIG-IP appliance is not configured to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level, this is a finding.
Fix: F-18610r290716_fix
Configure the BIG-IP appliance to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- F5BI-DM-000031
- Vuln IDs
-
- V-217388
- V-60113
- Rule IDs
-
- SV-217388r879546_rule
- SV-74543
Checks: C-18613r290718_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. If the BIG-IP appliance is not configure to use a remote authentication server to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period, this is a finding.
Fix: F-18611r290719_fix
Configure the BIG-IP appliance to use an approved remote authentication server to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- F5BI-DM-000033
- Vuln IDs
-
- V-217389
- V-60241
- Rule IDs
-
- SV-217389r879547_rule
- SV-74671
Checks: C-18614r290721_chk
Verify the BIG-IP appliance is configured to present a DoD-approved banner formatted in accordance with DTM-08-060. Navigate to the BIG-IP System manager >> System >> Preferences. Verify "Show The Security Banner On The Login Screen" is Enabled. Review the "Security Banner Text To Show On The Login Screen" under the "Security Settings" section for the following verbiage: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." If such a banner is not presented, this is a finding.
Fix: F-18612r290722_fix
Configure the BIG-IP appliance to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- F5BI-DM-000043
- Vuln IDs
-
- V-217390
- V-60121
- Rule IDs
-
- SV-217390r879554_rule
- SV-74551
Checks: C-18615r290724_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that protects against an individual (or process acting on behalf of an individual) falsely denying having performed system configuration changes. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that protects against an individual falsely denying having performed system configuration changes. If the BIG-IP appliance is not configured to protect against an individual (or process acting on behalf of an individual) falsely denying having performed system configuration changes, this is a finding.
Fix: F-18613r290725_fix
Configure the BIG-IP appliance to use a properly configured authentication server to protect against an individual (or process acting on behalf of an individual) falsely denying having performed system configuration changes.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- F5BI-DM-000075
- Vuln IDs
-
- V-217392
- V-60129
- Rule IDs
-
- SV-217392r879577_rule
- SV-74559
Checks: C-18617r290730_chk
Verify the BIG-IP appliance protects audit information from any type of unauthorized modification. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Verify authorized access is configured for each role under "Log Access". If the BIG-IP appliance is not configured to protect audit information from unauthorized modification, this is a finding.
Fix: F-18615r290731_fix
Configure the BIG-IP appliance to protect audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- F5BI-DM-000077
- Vuln IDs
-
- V-217393
- V-60131
- Rule IDs
-
- SV-217393r879578_rule
- SV-74561
Checks: C-18618r290733_chk
Verify the BIG-IP appliance protects audit information from any type of unauthorized deletion. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Verify authorized access is configured for each role under "Log Access". If the BIG-IP appliance is not configured to protect audit information from unauthorized deletion, this is a finding.
Fix: F-18616r290734_fix
Configure the BIG-IP appliance to protect audit information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- F5BI-DM-000079
- Vuln IDs
-
- V-217394
- V-60133
- Rule IDs
-
- SV-217394r879579_rule
- SV-74563
Checks: C-18619r290736_chk
Verify the BIG-IP appliance protects audit tools from unauthorized access. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Verify authorized access is configured for each role under "Log Access". If the BIG-IP appliance is not configured to protect its audit tools from unauthorized access, this is a finding.
Fix: F-18617r290737_fix
Configure the BIG-IP appliance to protect audit tools from unauthorized access.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- F5BI-DM-000093
- Vuln IDs
-
- V-217396
- V-60139
- Rule IDs
-
- SV-217396r879588_rule
- SV-74569
Checks: C-18621r290742_chk
Verify the BIG-IP appliance prohibits the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. Navigate to the BIG-IP System manager >> System >> Services. Verify no unauthorized services are configured or running. If any unnecessary or nonsecure functions are permitted, this is a finding.
Fix: F-18619r290743_fix
Configure the BIG-IP appliance to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- F5BI-DM-000101
- Vuln IDs
-
- V-217397
- V-60145
- Rule IDs
-
- SV-217397r879594_rule
- SV-74575
Checks: C-18622r290745_chk
Verify the BIG-IP appliance is configured to authenticate administrators with an individual authenticator prior to using a group authenticator. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that authenticates administrators to an administrators group. Navigate to System >> Users >> Remote Role Groups. Verify that administrators are assigned to the Administrator Role. If the BIG-IP appliance is not configured to authenticate administrators with an individual authenticator prior to using a group authenticator, this is a finding.
Fix: F-18620r290746_fix
Configure the BIG-IP appliance to authenticate administrators with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- F5BI-DM-000107
- Vuln IDs
-
- V-217398
- V-60147
- Rule IDs
-
- SV-217398r879601_rule
- SV-74577
Checks: C-18623r290748_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces a minimum 15-character password length. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces a minimum of 15-character password length. If the BIG-IP appliance is not configured to use a properly configured authentication server to enforce a minimum 15-character password length, this is a finding.
Fix: F-18621r290749_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce a minimum 15-character password length.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- F5BI-DM-000111
- Vuln IDs
-
- V-217399
- V-60249
- Rule IDs
-
- SV-217399r879603_rule
- SV-74679
Checks: C-18624r290751_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforce password complexity by requiring that at least one upper-case character be used. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces password complexity by requiring that at least one upper-case character be used. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces password complexity by requiring that at least one upper-case character be used, this is a finding.
Fix: F-18622r290752_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce password complexity by requiring that at least one upper-case character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- F5BI-DM-000113
- Vuln IDs
-
- V-217400
- V-60151
- Rule IDs
-
- SV-217400r879604_rule
- SV-74581
Checks: C-18625r290754_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces password complexity by requiring that at least one lower-case character be used. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces password complexity by requiring that at least one lower-case character be used. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces password complexity by requiring that at least one lower-case character be used, this is a finding.
Fix: F-18623r290755_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce password complexity by requiring that at least one lower-case character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- F5BI-DM-000115
- Vuln IDs
-
- V-217401
- V-60251
- Rule IDs
-
- SV-217401r879605_rule
- SV-74681
Checks: C-18626r290757_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces password complexity by requiring that at least one numeric character be used. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces password complexity by requiring that at least one numeric character be used. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces password complexity by requiring that at least one numeric character be used, this is a finding.
Fix: F-18624r290758_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- F5BI-DM-000117
- Vuln IDs
-
- V-217402
- V-60153
- Rule IDs
-
- SV-217402r879606_rule
- SV-74583
Checks: C-18627r290760_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces password complexity by requiring that at least one special character be used. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces password complexity by requiring that at least one special character be used. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces password complexity by requiring that at least one special character be used, this is a finding.
Fix: F-18625r290761_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- F5BI-DM-000119
- Vuln IDs
-
- V-217403
- V-60155
- Rule IDs
-
- SV-217403r879607_rule
- SV-74585
Checks: C-18628r290763_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that requires when a password is changed, the characters are changed in at least eight (8) of the positions within the password. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that requires when a password is changed, the characters are changed in at least eight (8) of the positions within the password. If the BIG-IP appliance is not configured to use a properly configured authentication server that requires when a password is changed, the characters are changed in at least eight (8) of the positions within the password, this is a finding.
Fix: F-18626r290764_fix
Configure the BIG-IP appliance to use a properly configured authentication server to require when a password is changed, the characters are changed in at least eight (8) of the positions within the password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- F5BI-DM-000121
- Vuln IDs
-
- V-217404
- V-60157
- Rule IDs
-
- SV-217404r879608_rule
- SV-74587
Checks: C-18629r290766_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces password encryption for storage. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that only stores encrypted representations of passwords. If the BIG-IP appliance is not configured to use a properly configured authentication server that stores encrypted representations of passwords, this is a finding.
Fix: F-18627r290767_fix
Configure the BIG-IP appliance to use a properly configured authentication server that only stores encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- F5BI-DM-000123
- Vuln IDs
-
- V-217405
- V-60159
- Rule IDs
-
- SV-217405r879609_rule
- SV-74589
Checks: C-18630r290769_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that transmits only encrypted representations of passwords. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that only transmits encrypted representations of passwords. If the BIG-IP appliance is not configured to use a properly configured authentication server that only transmits encrypted representations of passwords, this is a finding.
Fix: F-18628r290770_fix
Configure the BIG-IP appliance or its associated authentication server to transmit only encrypted representations of passwords.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- F5BI-DM-000133
- Vuln IDs
-
- V-217406
- V-60163
- Rule IDs
-
- SV-217406r879615_rule
- SV-74593
Checks: C-18631r290772_chk
Verify if the BIG-IP appliance is configured to obscure feedback of authentication information during the authentication process. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Encryption" is configured to use SSL for the authentication process with a properly configured authentication server. If the BIG-IP appliance is not configured to obscure feedback of authentication information during the authentication process, this is a finding.
Fix: F-18629r290773_fix
Configure the BIG-IP appliance to use SSL communications when connecting to a properly configured authentication server.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- F5BI-DM-000135
- Vuln IDs
-
- V-217407
- V-60255
- Rule IDs
-
- SV-217407r879616_rule
- SV-74685
Checks: C-18632r290775_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that uses mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that uses mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. If the BIG-IP appliance is not configured to use a properly configured authentication server that uses mechanisms that meet the requirements for authentication to a cryptographic module, this is a finding.
Fix: F-18630r513227_fix
Configure the BIG-IP appliance to use a properly configured authentication server that uses mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000879
- Version
- F5BI-DM-000137
- Vuln IDs
-
- V-217408
- V-60165
- Rule IDs
-
- SV-217408r939114_rule
- SV-74595
Checks: C-18633r939112_chk
Verify the BIG-IP appliance is configured to terminate all sessions and network connections when nonlocal device maintenance is completed. Navigate to the BIG-IP System manager >> System >> Preferences. Verify "Idle Time Before Automatic Logout" is set to 900 seconds (or less) and "Enforce Idle Timeout While View Dashboard" is enabled. If the BIG-IP appliance is not configured to terminate all idle sessions after 10 minutes or less, this is a finding.
Fix: F-18631r939113_fix
Verify the BIG-IP appliance is configured to terminate all sessions and network connections when nonlocal device maintenance is completed. Navigate to the BIG-IP System manager >> System >> Preferences. Verify "Idle Time Before Automatic Logout" is set to 900 seconds (or less) and "Enforce Idle Timeout While View Dashboard" is enabled. If the BIG-IP appliance is not configured to terminate all idle sessions after 10 minutes or less, this is a finding.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- F5BI-DM-000171
- Vuln IDs
-
- V-217410
- V-60187
- Rule IDs
-
- SV-217410r879696_rule
- SV-74617
Checks: C-18635r290784_chk
Verify the BIG-IP appliance is configured to use a properly configured remote authentication server that automatically audits account-enabling actions. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that automatically audits account-enabling actions. If the BIG-IP appliance is not configured to use a properly configured remote authentication server to automatically audit account-enabling actions, this is a finding.
Fix: F-18633r290785_fix
Configure the BIG-IP appliance to use a properly configured remote authentication server to automatically audit account-enabling actions.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002169
- Version
- F5BI-DM-000179
- Vuln IDs
-
- V-217411
- V-60193
- Rule IDs
-
- SV-217411r879706_rule
- SV-74623
Checks: C-18636r290787_chk
Verify the BIG-IP appliance enforces organization-defined role-based access control policy over defined subjects and objects. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server that assigns authenticated users to an appropriate group. Navigate to System >> Users >> Remote Role Groups. Verify Remote Role Groups are assigned proper Role Access and Partition Access. If the BIG-IP appliance is not configured to enforce organization-defined role-based access control policies over defined subjects and objects, this is a finding.
Fix: F-18634r290788_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce organization-defined role-based access control policy over defined subjects and objects.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- F5BI-DM-000191
- Vuln IDs
-
- V-217413
- V-60201
- Rule IDs
-
- SV-217413r879730_rule
- SV-74631
Checks: C-18638r290793_chk
Verify the BIG-IP appliance is configured to off-load audit records to a remote syslog server that allocates audit record storage capacity in accordance with organization-defined audit record storage requirements. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a syslog destination is configured that allocates audit record storage capacity in accordance with organization-defined audit record storage requirements. If audit record store capacity is not allocated in accordance with organization-defined audit record storage requirements, this is a finding.
Fix: F-18636r290794_fix
Configure the BIG-IP appliance to use a properly configured syslog server to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001893
- Version
- F5BI-DM-000201
- Vuln IDs
-
- V-217414
- V-60205
- Rule IDs
-
- SV-217414r879746_rule
- SV-74635
Checks: C-18639r290796_chk
Determine if the BIG-IP appliance is configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources. Navigate to the BIG-IP System manager >> Configuration >> Device >> NTP. Verify there is a primary time source and a secondary time source configured that are in different geographic regions. If the BIG-IP appliance is not configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources, this is a finding.
Fix: F-18637r290797_fix
Configure the BIG-IP appliance to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- F5BI-DM-000213
- Vuln IDs
-
- V-217415
- V-60209
- Rule IDs
-
- SV-217415r879753_rule
- SV-74639
Checks: C-18640r290799_chk
Verify the BIG-IP appliance is configured to enforce access restrictions associated with changes to device configuration. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server that assigns authenticated users to an appropriate group. Navigate to System >> Users >> Remote Role Groups. Verify Remote Role Groups are assigned proper Role Access and Partition Access to enforce access restrictions associated with changes to device configuration. If the BIG-IP appliance is not configured to enforce such access restrictions, this is a finding.
Fix: F-18638r290800_fix
Configure the BIG-IP appliance to use role-based access to enforce access restrictions associated with changes to device configuration.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- F5BI-DM-000215
- Vuln IDs
-
- V-217416
- V-60211
- Rule IDs
-
- SV-217416r879754_rule
- SV-74641
Checks: C-18641r290802_chk
Verify the BIG-IP appliance is configured to audit the enforcement actions used to restrict access associated with changes to the device. Navigate to the BIG-IP System manager >> Logs >> Configuration >> Options. Review configuration in the "Audit Logging" section. Verify that "MCP" is set to Debug. If the BIG-IP appliance is not configured to audit the enforcement actions used to restrict access associated with changes to the device, this is a finding.
Fix: F-18639r290803_fix
Configure the BIG-IP appliance to audit the enforcement actions used to restrict access associated with changes to the device.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-002385
- Version
- F5BI-DM-000239
- Vuln IDs
-
- V-217417
- V-60217
- Rule IDs
-
- SV-217417r879806_rule
- SV-74647
Checks: C-18642r290805_chk
Verify the BIG-IP appliance is configured to protect against or to limit the effects of DoS attacks by limiting the number of concurrent sessions. Review organizational Standard Operating Procedures (SOP) to ensure there is an organizational-defined threshold for the number of allowed connections to the management console. Navigate to the BIG-IP System manager >> System >> Preferences. Set "System Settings:" to "Advanced". Verify "Maximum HTTP Connections To Configuration Utility" is set to the number of allowed connections defined in the local SOP. If the BIG-IP appliance is not configured to protect against or limit the effects of DoS attacks by limiting the number of concurrent sessions, this is a finding.
Fix: F-18640r290806_fix
Configure the BIG-IP appliance to limit the effects of DoS attacks by employing security safeguards to limit the number of concurrent sessions to the configuration utility.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- F5BI-DM-000257
- Vuln IDs
-
- V-217418
- V-60219
- Rule IDs
-
- SV-217418r879886_rule
- SV-74649
Checks: C-18643r290808_chk
Verify the BIG-IP appliance is configured to off-load audit records onto a different system or media than the system being audited. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a syslog destination is configured that off-loads audit records from the BIG-IP appliance that is different from the system being audited. If BIG-IP appliance is not configured to off-load audit records onto a different system or media, this is a finding.
Fix: F-18641r290809_fix
Configure the BIG-IP appliance to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000259
- Vuln IDs
-
- V-217419
- V-60221
- Rule IDs
-
- SV-217419r879887_rule
- SV-74651
Checks: C-18644r290811_chk
Verify the BIG-IP appliance is configured in accordance with the security configuration settings based on applicable DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If the BIG-IP appliance is not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-18642r290812_fix
Configure the BIG-IP appliance to be in compliance with the applicable security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000269
- Vuln IDs
-
- V-217420
- V-60227
- Rule IDs
-
- SV-217420r916111_rule
- SV-74657
Checks: C-18645r290814_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to centrally manage authentication settings. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that employs automated mechanisms to centrally manage authentication settings. If authentication settings are not managed centrally using automated mechanisms, this is a finding.
Fix: F-18643r290815_fix
Configure the BIG-IP appliance to use an approved remote authentication server to employ automated mechanisms to centrally manage authentication settings.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- F5BI-DM-000277
- Vuln IDs
-
- V-217421
- V-60233
- Rule IDs
-
- SV-217421r916221_rule
- SV-74663
Checks: C-18646r290817_chk
Verify the BIG-IP appliance is capable of creating backups of system-level information contained in the information system when changes occur. Navigate to the BIG-IP System manager >> System >> Archives. Review the list of archives to verify backups are conducted in accordance with the local backup policy. If the BIG-IP appliance does not support the creating backups of system-level information contained in the information system when changes occur or weekly, this is a finding.
Fix: F-18644r290818_fix
Configure the BIG-IP appliance to create backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.
- RMF Control
- CP-9
- Severity
- M
- CCI
- CCI-000539
- Version
- F5BI-DM-000279
- Vuln IDs
-
- V-217422
- V-60235
- Rule IDs
-
- SV-217422r879887_rule
- SV-74665
Checks: C-18647r290820_chk
Verify the BIG-IP appliance is configured to off-load logs to a remote log server when changes occur. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a log destination is configured to allow for backups of information system documentation when changes occur. If the BIG-IP appliance does not backup the information system documentation, including security-related documentation, when changes occur, this is a finding.
Fix: F-18645r290821_fix
Configure the BIG-IP appliance to create backups of information system documentation, including security-related documentation, when changes occur.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000283
- Vuln IDs
-
- V-217423
- V-60239
- Rule IDs
-
- SV-217423r879887_rule
- SV-74669
Checks: C-18648r290823_chk
Verify the BIG-IP appliance is configured to obtain public key certificates from an appropriate certificate policy through a DoD-approved service provider. Navigate to the BIG-IP System manager >> System >> Device Certificates >> Device Certificate. Verify the device certificate has been obtained from an approved service provider. If the BIG-IP appliance does not obtain its public key certificates from an appropriate certificate policy through a DoD-approved service provider, this is a finding.
Fix: F-18646r290824_fix
Configure the BIG-IP appliance to obtain its public key certificates from an appropriate certificate policy through a DoD-approved service provider.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000284
- Vuln IDs
-
- V-217424
- V-97729
- Rule IDs
-
- SV-217424r879588_rule
- SV-106833
Checks: C-18649r290826_chk
Verify the F5 BIG-IP shell is locked down to limit the ability to modify the configuration through the shell. Log in to the Configuration utility as the administrative user. Navigate to System > Platform. Under Root Account, verify the Disable login and Disable bash check boxes are checked. If the value of systemauth.disablerootlogin and db systemauth.disablebash is not set to “true”, then this is a finding.
Fix: F-18647r513229_fix
To ensure that the F5 BIG-IP meets the requirements within the STIG, limit the ability to modify the configuration at the command line. SSH into the command line interface and type in the following commands. (tmos)# modify sys db systemauth.disablerootlogin value true (tmos)# modify sys db systemauth.disablebash value true (tmos)# save sys config
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000013
- Vuln IDs
-
- V-228978
- V-60095
- Rule IDs
-
- SV-228978r879887_rule
- SV-74525
Checks: C-31293r517981_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that provides automated account management. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that provides automated support for account management functions. If the BIG-IP appliance is not configured to use a remote authentication server to provide automated account management, this is a finding.
Fix: F-31270r517982_fix
Configure the BIG-IP appliance to use an approved remote authentication server that provides automated support for account management.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000015
- Vuln IDs
-
- V-228979
- V-60097
- Rule IDs
-
- SV-228979r879887_rule
- SV-74527
Checks: C-31294r517984_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to automatically disable or remove temporary accounts after 72 hours. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that automatically removes or disables temporary user accounts after 72 hours. If the use of temporary accounts is prohibited, this is not a finding. If the BIG-IP appliance is not configured to use a remote authentication server that automatically disables or removes temporary accounts after 72 hours, this is a finding.
Fix: F-31271r517985_fix
Configure the BIG-IP appliance to use an approved remote authentication server that automatically removes or disables temporary user accounts after 72 hours.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000017
- Vuln IDs
-
- V-228980
- V-60099
- Rule IDs
-
- SV-228980r879887_rule
- SV-74529
Checks: C-31295r517987_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that automatically disables accounts after 35 days of inactivity. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that automatically disables accounts after a 35-day period of account inactivity. If the BIG-IP appliance is not configured to use a remote authentication server that automatically disables accounts after a 35-day period of account inactivity, this is a finding.
Fix: F-31272r517988_fix
Configure the BIG-IP appliance to use an approved remote authentication server that automatically disables accounts after 35 days of inactivity.
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000052
- Version
- F5BI-DM-000037
- Vuln IDs
-
- V-228981
- V-60115
- Rule IDs
-
- SV-228981r879887_rule
- SV-74545
Checks: C-31296r517990_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to notify the administrator of the date and time of their last logon. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server to notify the administrator of the date and time of the last logon. If the administrator is not notified of the date and time of the last logon upon successful logon, this is a finding.
Fix: F-31273r517991_fix
Configure the BIG-IP appliance to use an approved remote authentication server to notify the administrator of the date and time of the last logon upon successful logon.
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000053
- Version
- F5BI-DM-000039
- Vuln IDs
-
- V-228982
- V-60117
- Rule IDs
-
- SV-228982r879887_rule
- SV-74547
Checks: C-31297r517993_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to notify the administrator of the number of unsuccessful logon attempts since the last successful logon. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server to notify the administrator of the number of unsuccessful logon attempts since the last successful logon. If the administrator is not notified of the number of unsuccessful logon attempts since the last successful logon, this is a finding.
Fix: F-31274r517994_fix
Configure the BIG-IP appliance to use an approved remote authentication server to notify the administrator of the number of unsuccessful logon attempts since the last successful logon, upon successful logon.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- F5BI-DM-000067
- Vuln IDs
-
- V-228983
- V-60123
- Rule IDs
-
- SV-228983r879887_rule
- SV-74553
Checks: C-31298r517996_chk
Verify the BIG-IP appliance is configured to alert the ISSO and SA (at a minimum) in the event of an audit processing failure. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Verify "MCP" under the "Audit Logging" section is set to Debug. If the BIG-IP appliance is not configured to alert in the event of an audit processing failure, this is a finding.
Fix: F-31275r517997_fix
Configure the BIG-IP appliance to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000073
- Vuln IDs
-
- V-228985
- V-60127
- Rule IDs
-
- SV-228985r879887_rule
- SV-74557
Checks: C-31300r518001_chk
Verify the BIG-IP appliance is configured to protect audit information from any type of unauthorized read access. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Verify authorized access is configured for each role under "Log Access". If the BIG-IP appliance does not protect audit information from any type of unauthorized read access, this is a finding.
Fix: F-31277r518002_fix
Configure the BIG-IP appliance to protect audit information from any type of unauthorized read access.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000087
- Vuln IDs
-
- V-228987
- V-60137
- Rule IDs
-
- SV-228987r879887_rule
- SV-74567
Checks: C-31302r518006_chk
Verify the BIG-IP appliance is configured to off-load audit information to a logging system that uses NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a syslog destination is configured that uses NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest. If the BIG-IP appliance does not off-load audit information to a remote logging system that uses NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest, this is a finding.
Fix: F-31279r518007_fix
Configure the BIG-IP appliance to off-load audit information to a system that uses NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- F5BI-DM-000095
- Vuln IDs
-
- V-228988
- V-60143
- Rule IDs
-
- SV-228988r879887_rule
- SV-74573
Checks: C-31303r518009_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that uniquely identifies and authenticates organizational administrators. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that uniquely identifies and authenticates organizational administrators. If the BIG-IP appliance is not configured to use a properly configured authentication server that uniquely identifies and authenticates organizational administrators, this is a finding.
Fix: F-31280r518010_fix
Configure the BIG-IP appliance to use a properly configured authentication server that uniquely identifies and authenticates organizational administrators.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000109
- Vuln IDs
-
- V-228989
- V-60149
- Rule IDs
-
- SV-228989r879887_rule
- SV-74579
Checks: C-31304r518012_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that prohibits password reuse for a minimum of five generations. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that prohibits password reuse for a minimum of five generations. If the BIG-IP appliance is not configured to use an associated authentication server that prohibits password reuse for a minimum of five generations, this is a finding.
Fix: F-31281r518013_fix
Configure the BIG-IP appliance to use a properly configured authentication server to prohibit password reuse for a minimum of five generations.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000125
- Vuln IDs
-
- V-228990
- V-60253
- Rule IDs
-
- SV-228990r879887_rule
- SV-74683
Checks: C-31305r518015_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces 24 hours/1 day as the minimum password lifetime. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces 24 hours/1 day as the minimum password lifetime. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-31282r518016_fix
Configure the BIG-IP appliance to use a properly configured authentication server that enforces 24 hours/1 day as the minimum password lifetime.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000127
- Vuln IDs
-
- V-228991
- V-60161
- Rule IDs
-
- SV-228991r879887_rule
- SV-74591
Checks: C-31306r518018_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces a 60-day maximum password lifetime. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces a 60-day maximum password lifetime restriction. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces a 60-day maximum password lifetime, this is a finding.
Fix: F-31283r518019_fix
Configure the BIG-IP appliance or its associated authentication server to enforce a 60-day maximum password lifetime.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000149
- Vuln IDs
-
- V-228992
- V-60171
- Rule IDs
-
- SV-228992r879887_rule
- SV-74601
Checks: C-31307r518021_chk
Verify the BIG-IP appliance is configured to use a properly configured remote authentication server to automatically disable or remove emergency accounts after 72 hours. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that automatically removes or disables emergency accounts after 72 hours. If the use of emergency accounts is prohibited, this is not a finding. If the BIG-IP appliance is not configured to use a properly configured authentication server to automatically disable or remove emergency accounts after 72 hours, this is a finding.
Fix: F-31284r518022_fix
Configure the BIG-IP appliance to use a properly configured remote authentication server to automatically disable or remove emergency accounts after 72 hours.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000151
- Vuln IDs
-
- V-228993
- V-60173
- Rule IDs
-
- SV-228993r879887_rule
- SV-74603
Checks: C-31308r518024_chk
Verify the BIG-IP appliance is configured to reveal error messages only to authorized individuals (ISSO, ISSM, and SA). Navigate to the BIG-IP System manager >> Logs >> Configuration >> Options. Verify that "Log Access" is granted only to authorized individuals (ISSO, ISSM, and SA). If the BIG-IP appliance reveals error messages to any unauthorized individuals (ISSO, ISSM, and SA), this is a finding.
Fix: F-31285r518025_fix
Configure the BIG-IP appliance to reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000153
- Vuln IDs
-
- V-228994
- V-60175
- Rule IDs
-
- SV-228994r879887_rule
- SV-74605
Checks: C-31309r518027_chk
Verify the BIG-IP appliance is configured to activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected. Navigate to the BIG-IP System manager >> Logs >> Configuration >> Options. Verify that "MCP" under the "Audit Logging" section is set to Debug. Navigate to the BIG-IP System manager >> System >> High Availability >> Fail-Safe >> System. Verify "Switch Board Failure" under the "System Trigger Properties" section is set to perform the appropriate action based on the location of the device. If the BIG-IP appliance is not configured to activate a system alert message, send an alarm, or automatically shut down when a component failure is detected, this is a finding.
Fix: F-31286r518028_fix
Configure the BIG-IP appliance to activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000155
- Vuln IDs
-
- V-228995
- V-60177
- Rule IDs
-
- SV-228995r879887_rule
- SV-74607
Checks: C-31310r518030_chk
Verify the BIG-IP appliance is configured to generate alerts that can be forwarded to the administrators and ISSO when accounts are created. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that generates alerts that can be forwarded to the administrators and ISSO when accounts are created. If the BIG-IP appliance is not configured to use an authentication server that would perform this function, this is a finding.
Fix: F-31287r518031_fix
Configure the BIG-IP appliance to use a properly configured authentication server to send a notification message to the administrators and ISSO when accounts are created.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000157
- Vuln IDs
-
- V-228996
- V-60179
- Rule IDs
-
- SV-228996r879887_rule
- SV-74609
Checks: C-31311r518033_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that generates alerts that can be forwarded to the administrators and ISSO when accounts are modified. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that generates alerts that can be forwarded to the administrators and ISSO when accounts are modified. If the BIG-IP appliance is not configured to use an authentication server that would perform this function, this is a finding.
Fix: F-31288r518034_fix
Configure the BIG-IP appliance to use a properly configured authentication server to send a notification message to the administrators and ISSO when accounts are modified.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000159
- Vuln IDs
-
- V-228997
- V-60181
- Rule IDs
-
- SV-228997r879887_rule
- SV-74611
Checks: C-31312r518036_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that generates alerts that can be forwarded to the administrators and ISSO when accounts are disabled. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that generates alerts that can be forwarded to the administrators and ISSO when accounts are disabled. If the BIG-IP appliance is not configured to use an authentication server that would perform this function, this is a finding.
Fix: F-31289r518037_fix
Configure the BIG-IP appliance to use a properly configured authentication server to send a notification message to the administrators and ISSO when accounts are disabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000161
- Vuln IDs
-
- V-228998
- V-60183
- Rule IDs
-
- SV-228998r879887_rule
- SV-74613
Checks: C-31313r518039_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that generates alerts that can be forwarded to the administrators and ISSO when accounts are removed. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that generates alerts that can be forwarded to the administrators and ISSO when accounts are removed. If the BIG-IP appliance is not configured to use an authentication server that would perform this function, this is a finding.
Fix: F-31290r518040_fix
Configure the BIG-IP appliance to use a properly configured authentication server to send a notification message to the administrators and ISSO when accounts are removed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000173
- Vuln IDs
-
- V-229000
- V-60189
- Rule IDs
-
- SV-229000r879887_rule
- SV-74619
Checks: C-31315r518045_chk
Verify the BIG-IP appliance is configured to use a properly configured remote authentication server to generate an immediate alert for account-enabling actions. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type to generate an immediate alert for account-enabling actions. If the BIG-IP appliance is not configured to use a properly configured remote authentication server to generate an immediate alert for account-enabling actions, this is a finding.
Fix: F-31292r518046_fix
Configure the BIG-IP appliance to use a properly configured remote authentication server to generate an immediate alert for account-enabling actions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000175
- Vuln IDs
-
- V-229001
- V-60191
- Rule IDs
-
- SV-229001r879887_rule
- SV-74621
Checks: C-31316r518048_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that transmits access authorization information using approved security safeguards to authorized information systems that enforce access control decisions. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server and SSL is set to use TLS. If the BIG-IP appliance transmits access authorization information without using approved security safeguards to authorized information systems that enforce access control decisions, this is a finding.
Fix: F-31293r518049_fix
Configure the BIG-IP appliance to use a properly configured authentication server that transmits access authorization information using approved security safeguards to authorized information systems that enforce access control decisions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000185
- Vuln IDs
-
- V-229002
- V-60195
- Rule IDs
-
- SV-229002r879887_rule
- SV-74625
Checks: C-31317r518051_chk
Verify the BIG-IP appliance is configured to use a properly configured remote authentication server to automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that automatically locks the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. If an account is not automatically locked out until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded, this is a finding.
Fix: F-31294r518052_fix
Configure the BIG-IP appliance to use a properly configured remote authentication server to automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- F5BI-DM-000187
- Vuln IDs
-
- V-229003
- V-60197
- Rule IDs
-
- SV-229003r879887_rule
- SV-74627
Checks: C-31318r518054_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that is able to notify the administrator upon successful logon of the location of last logon (terminal or IP address) in addition to the date and time of the last logon. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that is able to notify the administrator upon successful logon of the location of last logon (terminal or IP address) in addition to the date and time of the last logon. If the administrator is not notified of the location of last logon (terminal or IP address) upon successful logon (terminal or IP address) in addition to the date and time of the last logon, this is a finding.
Fix: F-31295r518055_fix
Configure the BIG-IP appliance to use a properly configured authentication server that is able to notify the administrator upon successful logon of the location of last logon (terminal or IP address) in addition to the date and time of the last logon.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- F5BI-DM-000193
- Vuln IDs
-
- V-229005
- V-60203
- Rule IDs
-
- SV-229005r879887_rule
- SV-74633
Checks: C-31320r518059_chk
Verify the BIG-IP appliance is configured to use a properly configured syslog server that generates an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a syslog destination is configured that generates an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. If an immediate alert is not generated when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity, this is a finding.
Fix: F-31297r518060_fix
Configure the BIG-IP appliance to use a properly configured syslog server to generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000211
- Vuln IDs
-
- V-229006
- V-60207
- Rule IDs
-
- SV-229006r879887_rule
- SV-74637
Checks: C-31321r518062_chk
Verify the BIG-IP appliance is configured to implement automated security responses if baseline configurations are changed in an unauthorized manner. Navigate to the BIG-IP System manager >> Logs >> Configuration >> Options. Review configuration in the "Audit Logging" section. Verify that "MCP" is set to Debug. If the BIG-IP appliance is not configured to implement automated security responses if baseline configurations are changed in an unauthorized manner, this is a finding.
Fix: F-31298r518063_fix
Configure the BIG-IP appliance to implement automated security responses if baseline configurations are changed in an unauthorized manner.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000227
- Vuln IDs
-
- V-229007
- V-60213
- Rule IDs
-
- SV-229007r879887_rule
- SV-74643
Checks: C-31322r518065_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that dynamically manages user accounts. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that is configured to dynamically manage user accounts. If the BIG-IP appliance is not configured to use a properly configured authentication server to dynamically manage user accounts, this is a finding.
Fix: F-31299r518066_fix
Configure the BIG-IP appliance to use a properly configured authentication server to dynamically manage user accounts.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000229
- Vuln IDs
-
- V-229008
- V-60215
- Rule IDs
-
- SV-229008r879887_rule
- SV-74645
Checks: C-31323r518068_chk
Verify the BIG-IP appliance is configured to use an authentication server that allows the use of a temporary password for system logons with an immediate change to a permanent password. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that allows the use of a temporary password for system logons with an immediate change to a permanent password. If the BIG-IP appliance is not configured to authenticate through an authentication server that allows the use of a temporary password for system logons with an immediate change to a permanent password, this is a finding.
Fix: F-31300r518069_fix
Configure the BIG-IP appliance to use an authentication server that allows the use of a temporary password for system logons with an immediate change to a permanent password.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- F5BI-DM-000261
- Vuln IDs
-
- V-229009
- V-60223
- Rule IDs
-
- SV-229009r879887_rule
- SV-74653
Checks: C-31324r518071_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that notifies the administrator of the number of successful logon attempts occurring during an organization-defined time period. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that notifies the administrator of the number of successful logon attempts occurring during an organization-defined time period. If the BIG-IP appliance is not configured to use a properly configured authentication server to notify the administrator of the number of successful logon attempts occurring during an organization-defined time period, this is a finding.
Fix: F-31301r518072_fix
Configure the BIG-IP appliance to use a properly configured authentication server to notify the administrator of the number of successful logon attempts occurring during an organization-defined time period.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000263
- Vuln IDs
-
- V-229010
- V-60225
- Rule IDs
-
- SV-229010r879887_rule
- SV-74655
Checks: C-31325r518074_chk
Verify the BIG-IP appliance is configured to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Log Destinations. Verify a log destination is configured for a CNDSP or other mechanism that is monitored by security personnel. If the BIG-IP appliance is not configured to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B, this is a finding.
Fix: F-31302r518075_fix
Configure the BIG-IP appliance to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000271
- Vuln IDs
-
- V-229011
- V-60229
- Rule IDs
-
- SV-229011r879887_rule
- SV-74659
Checks: C-31326r518077_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to centrally apply authentication settings. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that employs automated mechanisms to centrally apply authentication settings. If authentication settings are not applied centrally using automated mechanisms, this is a finding.
Fix: F-31303r518078_fix
Configure the BIG-IP appliance to use an approved remote authentication server to employ automated mechanisms to centrally apply authentication settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000273
- Vuln IDs
-
- V-229012
- V-60231
- Rule IDs
-
- SV-229012r879887_rule
- SV-74661
Checks: C-31327r518080_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to centrally verify authentication settings. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that employs automated mechanisms to centrally verify authentication settings. If authentication settings are not verified centrally using automated mechanisms, this is a finding.
Fix: F-31304r518081_fix
Configure the BIG-IP appliance to use an approved remote authentication server to employ automated mechanisms to centrally verify authentication settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000281
- Vuln IDs
-
- V-229013
- V-60237
- Rule IDs
-
- SV-229013r879887_rule
- SV-74667
Checks: C-31328r518083_chk
Verify the BIG-IP appliance is configured to employ automated mechanisms to assist in the tracking of security incidents. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Log Destinations. Verify a log destination is configured for a system that employs automated mechanisms to assist in the tracking of security incidents. If such automated mechanisms are not employed, this is a finding.
Fix: F-31305r518084_fix
Configure the BIG-IP appliance to direct logs to a system that employs automated mechanisms to assist in the tracking of security incidents.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- F5BI-DM-000290
- Vuln IDs
-
- V-230217
- Rule IDs
-
- SV-230217r879806_rule
Checks: C-32547r851134_chk
If the BIG-IP ASM module is not used to support user authentication, this is not applicable. Navigate to Security >> Options >> Application Security >> Advanced Configuration >> System Variables Verify cookie_httponly_attr is set to 1. If the BIG-IP appliance is being used to authenticate users for web applications, the HTTPOnly flag must be set, this is a finding.
Fix: F-32521r878106_fix
Configure a policy in the BIG-IP ASM module to enable the HTTPonly flag. Log in to the Configuration utility. Navigate to Security >> Options >> Application Security >> Advanced Configuration >> System Variables Create the variable cookie_httponly_attr. Set the Parameter to 1.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- F5BI-DM-000163
- Vuln IDs
-
- V-259332
- V-60185
- Rule IDs
-
- SV-259332r947351_rule
- SV-74615
Checks: C-63070r947349_chk
From the BIG-IP GUI: 1. System. 2. Preferences. 3. Under "Security Settings", verify "Require A Consistent Inbound IP For The Entire Web Session" box is checked. If the BIG-IP appliance is not configured to require a consistent inbound IP for the entire session for management sessions, this is a finding.
Fix: F-62979r947350_fix
Enable the "Require A Consistent Inbound IP For The Entire Web Session" setting using the Configuration utility. From the BIG-IP GUI: 1. System. 2. Preferences. 3. Under "Security Settings", check "Require A Consistent Inbound IP For The Entire Web Session". 4. Click "Update".
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- F5BI-DM-000291
- Vuln IDs
-
- V-260049
- Rule IDs
-
- SV-260049r947414_rule
Checks: C-63780r947355_chk
Verify the DoD banner is added to SSH. From the BIG-IP GUI: 1. System. 2. Configuration. 3. Device. 4. SSHD. 5. Verify the box for "Show The Security Banner On The Login Screen" is checked. 6. Review the "Security Banner Text To Show On The Login Screen" under the "Security Settings" section for the following verbiage: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." From the BIG-IP Console: tmsh list sys sshd banner # should return a value of 'enabled' tmsh list sys sshd banner-text # should return a value of: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG may inspect and seize data stored on this IS. Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." If such a banner is not presented, this is a finding.
Fix: F-63687r947354_fix
Add the SSH Banner. From the BIG-IP GUI: 1. System. 2. Configuration. 3. Device. 4. SSHD. 5. Check the box for "Show The Security Banner On The Login Screen". 6. Enter the following in the "Security Banner Text To Show On The Login Screen" under the "Security Settings" section: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." 7. Update. From the BIG-IP Console: tmsh modify sys sshd banner enabled tmsh modify sys sshd banner-text "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG may inspect and seize data stored on this IS. Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." tmsh save sys config