F5 BIG-IP Device Management 11.x Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V1R6). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-60091 Medium checkfix The BIG-IP appliance must limit the number of concurrent sessions to the Configuration Utility to 10 or an organization-defined number.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- F5BI-DM-000003
- Vuln IDs
-
- V-60091
- Rule IDs
-
- SV-74521r2_rule
Checks: C-60853r2_chk
Verify the BIG-IP appliance is configured to limit the number of concurrent sessions to 10 or an organization-defined number. Navigate to the BIG-IP System manager >> System >> Preferences. Set "System Settings:" to "Advanced". Verify "Maximum HTTP Connections to Configuration Utility" is set to the organization-defined number of concurrent sessions. If neither of these configurations is present, this is a finding.
Fix: F-65585r2_fix
Configure the BIG-IP appliance either to limit the number of concurrent sessions to 10 or an organization-defined number.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- F5BI-DM-000007
- Vuln IDs
-
- V-60093
- Rule IDs
-
- SV-74523r2_rule
Checks: C-60911r2_chk
Verify the BIG-IP appliance is configured to initiate a session lock after a 10-minute period of inactivity. Navigate to the BIG-IP System manager >> System >> Preferences. Under "Security Settings", ensure that "Idle Time Before Automatic Logout" is less than or equal to 600 seconds. If a session lock is not initiated after a 10-minute period of inactivity, this is a finding.
Fix: F-65643r2_fix
Configure the BIG-IP appliance to initiate a session lock after a 10-minute period of inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- F5BI-DM-000013
- Vuln IDs
-
- V-60095
- Rule IDs
-
- SV-74525r1_rule
Checks: C-60913r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that provides automated account management. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that provides automated support for account management functions. If the BIG-IP appliance is not configured to use a remote authentication server to provide automated account management, this is a finding.
Fix: F-65645r1_fix
Configure the BIG-IP appliance to use an approved remote authentication server that provides automated support for account management.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- F5BI-DM-000015
- Vuln IDs
-
- V-60097
- Rule IDs
-
- SV-74527r1_rule
Checks: C-60915r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to automatically disable or remove temporary accounts after 72 hours. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that automatically removes or disables temporary user accounts after 72 hours. If the use of temporary accounts is prohibited, this is not a finding. If the BIG-IP appliance is not configured to use a remote authentication server that automatically disables or removes temporary accounts after 72 hours, this is a finding.
Fix: F-65647r1_fix
Configure the BIG-IP appliance to use an approved remote authentication server that automatically removes or disables temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- F5BI-DM-000017
- Vuln IDs
-
- V-60099
- Rule IDs
-
- SV-74529r1_rule
Checks: C-60917r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that automatically disables accounts after 35 days of inactivity. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that automatically disables accounts after a 35-day period of account inactivity. If the BIG-IP appliance is not configured to use a remote authentication server that automatically disables accounts after a 35-day period of account inactivity, this is a finding.
Fix: F-65649r1_fix
Configure the BIG-IP appliance to use an approved remote authentication server that automatically disables accounts after 35 days of inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- F5BI-DM-000019
- Vuln IDs
-
- V-60103
- Rule IDs
-
- SV-74533r1_rule
Checks: C-60921r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that automatically audits account creation. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that automatically audits account creation. If the BIG-IP appliance is not configured to use a remote authentication server that automatically audits account creation, this is a finding.
Fix: F-65653r1_fix
Configure the BIG-IP appliance to use an approved remote authentication server that automatically audits the creation of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- F5BI-DM-000021
- Vuln IDs
-
- V-60105
- Rule IDs
-
- SV-74535r1_rule
Checks: C-60923r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that automatically audits account modifications. Verify the BIG-IP appliance is configured to utilize a properly configured authentication server. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured to use an approved remote authentication server that automatically audits account modification. If account modification is not automatically audited, this is a finding.
Fix: F-65655r1_fix
Configure the BIG-IP appliance to use an approved authentication server that automatically audits account modifications.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- F5BI-DM-000023
- Vuln IDs
-
- V-60107
- Rule IDs
-
- SV-74537r1_rule
Checks: C-60925r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that automatically audits account-disabling actions. Verify the BIG-IP appliance is configured to use a properly configured authentication server. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured to use an approved remote authentication server that automatically audits account-disabling actions. If account disabling is not automatically audited, this is a finding.
Fix: F-65657r1_fix
Configure the BIG-IP appliance to use an approved authentication server that automatically audits account-disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- F5BI-DM-000025
- Vuln IDs
-
- V-60109
- Rule IDs
-
- SV-74539r1_rule
Checks: C-60927r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server that automatically audits account removal actions. Verify the BIG-IP appliance is configured to use a properly configured authentication server. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured to use an approved remote authentication server that automatically audits account removal actions. If account removal is not automatically audited, this is a finding.
Fix: F-65659r1_fix
Configure the BIG-IP appliance to use an approved authentication server that automatically audits account removal actions.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- F5BI-DM-000027
- Vuln IDs
-
- V-60111
- Rule IDs
-
- SV-74541r1_rule
Checks: C-60929r1_chk
Verify the BIG-IP appliance is configured to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device. Verify the BIG-IP appliance is configured to utilize a properly configured authentication server. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured to use an approved remote authentication server that enforces the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level. If the BIG-IP appliance is not configured to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level, this is a finding.
Fix: F-65661r1_fix
Configure the BIG-IP appliance to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- F5BI-DM-000031
- Vuln IDs
-
- V-60113
- Rule IDs
-
- SV-74543r1_rule
Checks: C-60931r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. If the BIG-IP appliance is not configure to use a remote authentication server to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period, this is a finding.
Fix: F-65663r1_fix
Configure the BIG-IP appliance to use an approved remote authentication server to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000052
- Version
- F5BI-DM-000037
- Vuln IDs
-
- V-60115
- Rule IDs
-
- SV-74545r1_rule
Checks: C-60933r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to notify the administrator of the date and time of their last logon. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server to notify the administrator of the date and time of the last logon. If the administrator is not notified of the date and time of the last logon upon successful logon, this is a finding.
Fix: F-65665r1_fix
Configure the BIG-IP appliance to use an approved remote authentication server to notify the administrator of the date and time of the last logon upon successful logon.
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000053
- Version
- F5BI-DM-000039
- Vuln IDs
-
- V-60117
- Rule IDs
-
- SV-74547r1_rule
Checks: C-60935r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to notify the administrator of the number of unsuccessful logon attempts since the last successful logon. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server to notify the administrator of the number of unsuccessful logon attempts since the last successful logon. If the administrator is not notified of the number of unsuccessful logon attempts since the last successful logon, this is a finding.
Fix: F-65667r1_fix
Configure the BIG-IP appliance to use an approved remote authentication server to notify the administrator of the number of unsuccessful logon attempts since the last successful logon, upon successful logon.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- F5BI-DM-000043
- Vuln IDs
-
- V-60121
- Rule IDs
-
- SV-74551r1_rule
Checks: C-60939r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that protects against an individual (or process acting on behalf of an individual) falsely denying having performed system configuration changes. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that protects against an individual falsely denying having performed system configuration changes. If the BIG-IP appliance is not configured to protect against an individual (or process acting on behalf of an individual) falsely denying having performed system configuration changes, this is a finding.
Fix: F-65671r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to protect against an individual (or process acting on behalf of an individual) falsely denying having performed system configuration changes.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-000139
- Version
- F5BI-DM-000067
- Vuln IDs
-
- V-60123
- Rule IDs
-
- SV-74553r1_rule
Checks: C-60943r1_chk
Verify the BIG-IP appliance is configured to alert the ISSO and SA (at a minimum) in the event of an audit processing failure. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Verify "MCP" under the "Audit Logging" section is set to Debug. If the BIG-IP appliance is not configured to alert in the event of an audit processing failure, this is a finding.
Fix: F-65675r1_fix
Configure the BIG-IP appliance to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-000140
- Version
- F5BI-DM-000069
- Vuln IDs
-
- V-60125
- Rule IDs
-
- SV-74555r1_rule
Checks: C-60945r1_chk
Verify the BIG-IP appliance is configured to shut down or restart upon audit failure. Navigate to the BIG-IP System manager >> System >> High Availability >> Fail-Safe >> System. Verify "Switch Board Failure" under the "System Trigger Properties" section is set to perform the appropriate action based on the location of the device. If the BIG-IP appliance is not configured to shut down or restart upon audit failure, this is a finding.
Fix: F-65677r1_fix
Configure the BIG-IP appliance to shut down or restart upon audit failure, based on the location of the device.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- F5BI-DM-000073
- Vuln IDs
-
- V-60127
- Rule IDs
-
- SV-74557r1_rule
Checks: C-60947r1_chk
Verify the BIG-IP appliance is configured to protect audit information from any type of unauthorized read access. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Verify authorized access is configured for each role under "Log Access". If the BIG-IP appliance does not protect audit information from any type of unauthorized read access, this is a finding.
Fix: F-65679r1_fix
Configure the BIG-IP appliance to protect audit information from any type of unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- F5BI-DM-000075
- Vuln IDs
-
- V-60129
- Rule IDs
-
- SV-74559r1_rule
Checks: C-60949r1_chk
Verify the BIG-IP appliance protects audit information from any type of unauthorized modification. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Verify authorized access is configured for each role under "Log Access". If the BIG-IP appliance is not configured to protect audit information from unauthorized modification, this is a finding.
Fix: F-65683r2_fix
Configure the BIG-IP appliance to protect audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- F5BI-DM-000077
- Vuln IDs
-
- V-60131
- Rule IDs
-
- SV-74561r1_rule
Checks: C-60955r1_chk
Verify the BIG-IP appliance protects audit information from any type of unauthorized deletion. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Verify authorized access is configured for each role under "Log Access". If the BIG-IP appliance is not configured to protect audit information from unauthorized deletion, this is a finding.
Fix: F-65687r1_fix
Configure the BIG-IP appliance to protect audit information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- F5BI-DM-000079
- Vuln IDs
-
- V-60133
- Rule IDs
-
- SV-74563r1_rule
Checks: C-60959r1_chk
Verify the BIG-IP appliance protects audit tools from unauthorized access. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Verify authorized access is configured for each role under "Log Access". If the BIG-IP appliance is not configured to protect its audit tools from unauthorized access, this is a finding.
Fix: F-65691r1_fix
Configure the BIG-IP appliance to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001348
- Version
- F5BI-DM-000085
- Vuln IDs
-
- V-60135
- Rule IDs
-
- SV-74565r1_rule
Checks: C-60961r1_chk
Verify the BIG-IP appliance is configured to off-load logs to a remote syslog server that backs up audit records at least every seven (7) days onto a different system or system component than the system or component being audited. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a syslog destination is configured that backs up audit records at least every seven (7) days onto a different system or system component than the system or component being audited. If the BIG-IP appliance is not configured to off-load logs to a remote syslog server that backs up audit records at least every seven (7) days onto a different system or system component than the system or component being audited, this is a finding.
Fix: F-65693r1_fix
Configure the BIG-IP appliance to off-load logs to a remote syslog server to back up audit records at least every seven days onto a different system or system component than the system or component being audited.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001350
- Version
- F5BI-DM-000087
- Vuln IDs
-
- V-60137
- Rule IDs
-
- SV-74567r2_rule
Checks: C-60963r2_chk
Verify the BIG-IP appliance is configured to off-load audit information to a logging system that uses NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a syslog destination is configured that uses NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest. If the BIG-IP appliance does not off-load audit information to a remote logging system that uses NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest, this is a finding.
Fix: F-65695r2_fix
Configure the BIG-IP appliance to off-load audit information to a system that uses NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- F5BI-DM-000093
- Vuln IDs
-
- V-60139
- Rule IDs
-
- SV-74569r1_rule
Checks: C-60965r1_chk
Verify the BIG-IP appliance prohibits the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. Navigate to the BIG-IP System manager >> System >> Services. Verify no unauthorized services are configured or running. If any unnecessary or nonsecure functions are permitted, this is a finding.
Fix: F-65697r1_fix
Configure the BIG-IP appliance to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- F5BI-DM-000095
- Vuln IDs
-
- V-60143
- Rule IDs
-
- SV-74573r1_rule
Checks: C-60997r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that uniquely identifies and authenticates organizational administrators. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that uniquely identifies and authenticates organizational administrators. If the BIG-IP appliance is not configured to use a properly configured authentication server that uniquely identifies and authenticates organizational administrators, this is a finding.
Fix: F-65731r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server that uniquely identifies and authenticates organizational administrators.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- F5BI-DM-000101
- Vuln IDs
-
- V-60145
- Rule IDs
-
- SV-74575r1_rule
Checks: C-60999r1_chk
Verify the BIG-IP appliance is configured to authenticate administrators with an individual authenticator prior to using a group authenticator. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that authenticates administrators to an administrators group. Navigate to System >> Users >> Remote Role Groups. Verify that administrators are assigned to the Administrator Role. If the BIG-IP appliance is not configured to authenticate administrators with an individual authenticator prior to using a group authenticator, this is a finding.
Fix: F-65733r1_fix
Configure the BIG-IP appliance to authenticate administrators with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- F5BI-DM-000107
- Vuln IDs
-
- V-60147
- Rule IDs
-
- SV-74577r1_rule
Checks: C-61001r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces a minimum 15-character password length. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces a minimum of 15-character password length. If the BIG-IP appliance is not configured to use a properly configured authentication server to enforce a minimum 15-character password length, this is a finding.
Fix: F-65735r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce a minimum 15-character password length.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- F5BI-DM-000109
- Vuln IDs
-
- V-60149
- Rule IDs
-
- SV-74579r1_rule
Checks: C-61003r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that prohibits password reuse for a minimum of five generations. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that prohibits password reuse for a minimum of five generations. If the BIG-IP appliance is not configured to use an associated authentication server that prohibits password reuse for a minimum of five generations, this is a finding.
Fix: F-65737r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to prohibit password reuse for a minimum of five generations.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- F5BI-DM-000113
- Vuln IDs
-
- V-60151
- Rule IDs
-
- SV-74581r1_rule
Checks: C-61005r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces password complexity by requiring that at least one lower-case character be used. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces password complexity by requiring that at least one lower-case character be used. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces password complexity by requiring that at least one lower-case character be used, this is a finding.
Fix: F-65739r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce password complexity by requiring that at least one lower-case character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- F5BI-DM-000117
- Vuln IDs
-
- V-60153
- Rule IDs
-
- SV-74583r1_rule
Checks: C-61007r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces password complexity by requiring that at least one special character be used. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces password complexity by requiring that at least one special character be used. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces password complexity by requiring that at least one special character be used, this is a finding.
Fix: F-65741r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- F5BI-DM-000119
- Vuln IDs
-
- V-60155
- Rule IDs
-
- SV-74585r2_rule
Checks: C-61009r3_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that requires when a password is changed, the characters are changed in at least eight (8) of the positions within the password. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that requires when a password is changed, the characters are changed in at least eight (8) of the positions within the password. If the BIG-IP appliance is not configured to use a properly configured authentication server that requires when a password is changed, the characters are changed in at least eight (8) of the positions within the password, this is a finding.
Fix: F-65743r2_fix
Configure the BIG-IP appliance to use a properly configured authentication server to require when a password is changed, the characters are changed in at least eight (8) of the positions within the password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- F5BI-DM-000121
- Vuln IDs
-
- V-60157
- Rule IDs
-
- SV-74587r1_rule
Checks: C-61011r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces password encryption for storage. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that only stores encrypted representations of passwords. If the BIG-IP appliance is not configured to use a properly configured authentication server that stores encrypted representations of passwords, this is a finding.
Fix: F-65745r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server that only stores encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- F5BI-DM-000123
- Vuln IDs
-
- V-60159
- Rule IDs
-
- SV-74589r1_rule
Checks: C-61013r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that transmits only encrypted representations of passwords. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that only transmits encrypted representations of passwords. If the BIG-IP appliance is not configured to use a properly configured authentication server that only transmits encrypted representations of passwords, this is a finding.
Fix: F-65747r1_fix
Configure the BIG-IP appliance or its associated authentication server to transmit only encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- F5BI-DM-000127
- Vuln IDs
-
- V-60161
- Rule IDs
-
- SV-74591r1_rule
Checks: C-61015r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces a 60-day maximum password lifetime. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces a 60-day maximum password lifetime restriction. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces a 60-day maximum password lifetime, this is a finding.
Fix: F-65749r1_fix
Configure the BIG-IP appliance or its associated authentication server to enforce a 60-day maximum password lifetime.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- F5BI-DM-000133
- Vuln IDs
-
- V-60163
- Rule IDs
-
- SV-74593r2_rule
Checks: C-61017r2_chk
Verify if the BIG-IP appliance is configured to obscure feedback of authentication information during the authentication process. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Encryption" is configured to use SSL for the authentication process with a properly configured authentication server. If the BIG-IP appliance is not configured to obscure feedback of authentication information during the authentication process, this is a finding.
Fix: F-65751r1_fix
Configure the BIG-IP appliance to use SSL communications when connecting to a properly configured authentication server.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000879
- Version
- F5BI-DM-000137
- Vuln IDs
-
- V-60165
- Rule IDs
-
- SV-74595r1_rule
Checks: C-61019r1_chk
Verify the BIG-IP appliance is configured to terminate all sessions and network connections when nonlocal device maintenance is completed. Navigate to the BIG-IP System manager >> System >> Preferences. Verify that "Idle Time Before Automatic Logout" is set to 10 minutes or less. If the BIG-IP appliance is not configured to terminate all sessions and network connections when nonlocal device maintenance is complete, this is a finding.
Fix: F-65753r1_fix
Configure the BIG-IP appliance to terminate all sessions and network connections when nonlocal device maintenance is completed.
- RMF Control
- SC-10
- Severity
- H
- CCI
- CCI-001133
- Version
- F5BI-DM-000139
- Vuln IDs
-
- V-60167
- Rule IDs
-
- SV-74597r1_rule
Checks: C-61021r1_chk
Verify the BIG-IP appliance is configured to terminate a connection associated with a device management session at the end of the session or after 10 minutes of inactivity. Navigate to the BIG-IP System manager >> System >> Preferences. Verify that "Idle Time Before Automatic Logout" is set to 10 minutes or less. If the BIG-IP appliance is not configured to terminate the connection associated with a device management session at the end of the session or after 10 minutes of inactivity, this is a finding.
Fix: F-65755r1_fix
Configure the BIG-IP appliance to terminate the connection associated with a device management session at the end of the session or after 10 minutes of inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- F5BI-DM-000149
- Vuln IDs
-
- V-60171
- Rule IDs
-
- SV-74601r1_rule
Checks: C-61025r1_chk
Verify the BIG-IP appliance is configured to use a properly configured remote authentication server to automatically disable or remove emergency accounts after 72 hours. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that automatically removes or disables emergency accounts after 72 hours. If the use of emergency accounts is prohibited, this is not a finding. If the BIG-IP appliance is not configured to use a properly configured authentication server to automatically disable or remove emergency accounts after 72 hours, this is a finding.
Fix: F-65759r1_fix
Configure the BIG-IP appliance to use a properly configured remote authentication server to automatically disable or remove emergency accounts after 72 hours.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- F5BI-DM-000151
- Vuln IDs
-
- V-60173
- Rule IDs
-
- SV-74603r1_rule
Checks: C-61027r1_chk
Verify the BIG-IP appliance is configured to reveal error messages only to authorized individuals (ISSO, ISSM, and SA). Navigate to the BIG-IP System manager >> Logs >> Configuration >> Options. Verify that "Log Access" is granted only to authorized individuals (ISSO, ISSM, and SA). If the BIG-IP appliance reveals error messages to any unauthorized individuals (ISSO, ISSM, and SA), this is a finding.
Fix: F-65761r1_fix
Configure the BIG-IP appliance to reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000153
- Vuln IDs
-
- V-60175
- Rule IDs
-
- SV-74605r1_rule
Checks: C-61029r1_chk
Verify the BIG-IP appliance is configured to activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected. Navigate to the BIG-IP System manager >> Logs >> Configuration >> Options. Verify that "MCP" under the "Audit Logging" section is set to Debug. Navigate to the BIG-IP System manager >> System >> High Availability >> Fail-Safe >> System. Verify "Switch Board Failure" under the "System Trigger Properties" section is set to perform the appropriate action based on the location of the device. If the BIG-IP appliance is not configured to activate a system alert message, send an alarm, or automatically shut down when a component failure is detected, this is a finding.
Fix: F-65763r1_fix
Configure the BIG-IP appliance to activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001683
- Version
- F5BI-DM-000155
- Vuln IDs
-
- V-60177
- Rule IDs
-
- SV-74607r1_rule
Checks: C-61031r1_chk
Verify the BIG-IP appliance is configured to generate alerts that can be forwarded to the administrators and ISSO when accounts are created. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that generates alerts that can be forwarded to the administrators and ISSO when accounts are created. If the BIG-IP appliance is not configured to use an authentication server that would perform this function, this is a finding.
Fix: F-65765r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to send a notification message to the administrators and ISSO when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001684
- Version
- F5BI-DM-000157
- Vuln IDs
-
- V-60179
- Rule IDs
-
- SV-74609r1_rule
Checks: C-61033r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that generates alerts that can be forwarded to the administrators and ISSO when accounts are modified. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that generates alerts that can be forwarded to the administrators and ISSO when accounts are modified. If the BIG-IP appliance is not configured to use an authentication server that would perform this function, this is a finding.
Fix: F-65767r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to send a notification message to the administrators and ISSO when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001685
- Version
- F5BI-DM-000159
- Vuln IDs
-
- V-60181
- Rule IDs
-
- SV-74611r1_rule
Checks: C-61035r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that generates alerts that can be forwarded to the administrators and ISSO when accounts are disabled. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that generates alerts that can be forwarded to the administrators and ISSO when accounts are disabled. If the BIG-IP appliance is not configured to use an authentication server that would perform this function, this is a finding.
Fix: F-65769r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to send a notification message to the administrators and ISSO when accounts are disabled.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001686
- Version
- F5BI-DM-000161
- Vuln IDs
-
- V-60183
- Rule IDs
-
- SV-74613r1_rule
Checks: C-61037r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that generates alerts that can be forwarded to the administrators and ISSO when accounts are removed. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that generates alerts that can be forwarded to the administrators and ISSO when accounts are removed. If the BIG-IP appliance is not configured to use an authentication server that would perform this function, this is a finding.
Fix: F-65771r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to send a notification message to the administrators and ISSO when accounts are removed.
- RMF Control
- AC-12
- Severity
- H
- CCI
- CCI-002361
- Version
- F5BI-DM-000163
- Vuln IDs
-
- V-60185
- Rule IDs
-
- SV-74615r1_rule
Checks: C-61039r1_chk
Verify the BIG-IP appliance is configured to automatically terminate an administrator session after organization-defined conditions or trigger events requiring session disconnect. Navigate to the BIG-IP System manager >> System >> Preferences. Review the "Security Settings" section. Verify "Idle Time Before Automatic Logout" is set to 900 seconds or less. Verify "Restrict A Consistent Inbound IP For The Entire Session" is Enabled. Verify "Enforce Idle Timeout While View Dashboard" is Enabled. If the BIG-IP appliance is not configured to automatically terminate an administrator session under the designated conditions or trigger events, this is a finding.
Fix: F-65773r1_fix
Configure the BIG-IP appliance to automatically terminate an administrator session after organization-defined conditions or trigger events requiring session disconnect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- F5BI-DM-000171
- Vuln IDs
-
- V-60187
- Rule IDs
-
- SV-74617r1_rule
Checks: C-61041r1_chk
Verify the BIG-IP appliance is configured to use a properly configured remote authentication server that automatically audits account-enabling actions. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that automatically audits account-enabling actions. If the BIG-IP appliance is not configured to use a properly configured remote authentication server to automatically audit account-enabling actions, this is a finding.
Fix: F-65775r1_fix
Configure the BIG-IP appliance to use a properly configured remote authentication server to automatically audit account-enabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- F5BI-DM-000173
- Vuln IDs
-
- V-60189
- Rule IDs
-
- SV-74619r1_rule
Checks: C-61043r1_chk
Verify the BIG-IP appliance is configured to use a properly configured remote authentication server to generate an immediate alert for account-enabling actions. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type to generate an immediate alert for account-enabling actions. If the BIG-IP appliance is not configured to use a properly configured remote authentication server to generate an immediate alert for account-enabling actions, this is a finding.
Fix: F-65777r1_fix
Configure the BIG-IP appliance to use a properly configured remote authentication server to generate an immediate alert for account-enabling actions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000175
- Vuln IDs
-
- V-60191
- Rule IDs
-
- SV-74621r1_rule
Checks: C-61045r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that transmits access authorization information using approved security safeguards to authorized information systems that enforce access control decisions. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server and SSL is set to use TLS. If the BIG-IP appliance transmits access authorization information without using approved security safeguards to authorized information systems that enforce access control decisions, this is a finding.
Fix: F-65779r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server that transmits access authorization information using approved security safeguards to authorized information systems that enforce access control decisions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000179
- Vuln IDs
-
- V-60193
- Rule IDs
-
- SV-74623r1_rule
Checks: C-61047r1_chk
Verify the BIG-IP appliance enforces organization-defined role-based access control policy over defined subjects and objects. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server that assigns authenticated users to an appropriate group. Navigate to System >> Users >> Remote Role Groups. Verify Remote Role Groups are assigned proper Role Access and Partition Access. If the BIG-IP appliance is not configured to enforce organization-defined role-based access control policies over defined subjects and objects, this is a finding.
Fix: F-65781r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce organization-defined role-based access control policy over defined subjects and objects.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- F5BI-DM-000185
- Vuln IDs
-
- V-60195
- Rule IDs
-
- SV-74625r1_rule
Checks: C-61049r1_chk
Verify the BIG-IP appliance is configured to use a properly configured remote authentication server to automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that automatically locks the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. If an account is not automatically locked out until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded, this is a finding.
Fix: F-65783r1_fix
Configure the BIG-IP appliance to use a properly configured remote authentication server to automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- F5BI-DM-000187
- Vuln IDs
-
- V-60197
- Rule IDs
-
- SV-74627r1_rule
Checks: C-61051r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that is able to notify the administrator upon successful logon of the location of last logon (terminal or IP address) in addition to the date and time of the last logon. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that is able to notify the administrator upon successful logon of the location of last logon (terminal or IP address) in addition to the date and time of the last logon. If the administrator is not notified of the location of last logon (terminal or IP address) upon successful logon (terminal or IP address) in addition to the date and time of the last logon, this is a finding.
Fix: F-65785r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server that is able to notify the administrator upon successful logon of the location of last logon (terminal or IP address) in addition to the date and time of the last logon.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- F5BI-DM-000189
- Vuln IDs
-
- V-60199
- Rule IDs
-
- SV-74629r1_rule
Checks: C-61053r1_chk
Verify the BIG-IP appliance is configured to only allow organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server that assigns authenticated users to an appropriate group. Navigate to System >> Users >> Remote Role Groups. Verify Remote Role Groups are assigned proper Role Access and Partition Access. If the BIG-IP appliance is not configured to provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time, this is a finding.
Fix: F-65787r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to provide the capability for organization-identified individuals or roles be assigned to change the auditing to be performed based on all selectable event criteria within near-real-time.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- F5BI-DM-000191
- Vuln IDs
-
- V-60201
- Rule IDs
-
- SV-74631r1_rule
Checks: C-61055r1_chk
Verify the BIG-IP appliance is configured to off-load audit records to a remote syslog server that allocates audit record storage capacity in accordance with organization-defined audit record storage requirements. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a syslog destination is configured that allocates audit record storage capacity in accordance with organization-defined audit record storage requirements. If audit record store capacity is not allocated in accordance with organization-defined audit record storage requirements, this is a finding.
Fix: F-65789r1_fix
Configure the BIG-IP appliance to use a properly configured syslog server to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001855
- Version
- F5BI-DM-000193
- Vuln IDs
-
- V-60203
- Rule IDs
-
- SV-74633r1_rule
Checks: C-61057r1_chk
Verify the BIG-IP appliance is configured to use a properly configured syslog server that generates an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a syslog destination is configured that generates an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. If an immediate alert is not generated when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity, this is a finding.
Fix: F-65791r1_fix
Configure the BIG-IP appliance to use a properly configured syslog server to generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000201
- Vuln IDs
-
- V-60205
- Rule IDs
-
- SV-74635r1_rule
Checks: C-61059r1_chk
Determine if the BIG-IP appliance is configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources. Navigate to the BIG-IP System manager >> Configuration >> Device >> NTP. Verify there is a primary time source and a secondary time source configured that are in different geographic regions. If the BIG-IP appliance is not configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources, this is a finding.
Fix: F-65793r1_fix
Configure the BIG-IP appliance to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- F5BI-DM-000211
- Vuln IDs
-
- V-60207
- Rule IDs
-
- SV-74637r1_rule
Checks: C-61083r1_chk
Verify the BIG-IP appliance is configured to implement automated security responses if baseline configurations are changed in an unauthorized manner. Navigate to the BIG-IP System manager >> Logs >> Configuration >> Options. Review configuration in the "Audit Logging" section. Verify that "MCP" is set to Debug. If the BIG-IP appliance is not configured to implement automated security responses if baseline configurations are changed in an unauthorized manner, this is a finding.
Fix: F-65823r1_fix
Configure the BIG-IP appliance to implement automated security responses if baseline configurations are changed in an unauthorized manner.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- F5BI-DM-000213
- Vuln IDs
-
- V-60209
- Rule IDs
-
- SV-74639r1_rule
Checks: C-61119r1_chk
Verify the BIG-IP appliance is configured to enforce access restrictions associated with changes to device configuration. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server that assigns authenticated users to an appropriate group. Navigate to System >> Users >> Remote Role Groups. Verify Remote Role Groups are assigned proper Role Access and Partition Access to enforce access restrictions associated with changes to device configuration. If the BIG-IP appliance is not configured to enforce such access restrictions, this is a finding.
Fix: F-65825r1_fix
Configure the BIG-IP appliance to use role-based access to enforce access restrictions associated with changes to device configuration.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- F5BI-DM-000215
- Vuln IDs
-
- V-60211
- Rule IDs
-
- SV-74641r1_rule
Checks: C-61125r1_chk
Verify the BIG-IP appliance is configured to audit the enforcement actions used to restrict access associated with changes to the device. Navigate to the BIG-IP System manager >> Logs >> Configuration >> Options. Review configuration in the "Audit Logging" section. Verify that "MCP" is set to Debug. If the BIG-IP appliance is not configured to audit the enforcement actions used to restrict access associated with changes to the device, this is a finding.
Fix: F-65827r1_fix
Configure the BIG-IP appliance to audit the enforcement actions used to restrict access associated with changes to the device.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000227
- Vuln IDs
-
- V-60213
- Rule IDs
-
- SV-74643r1_rule
Checks: C-61131r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that dynamically manages user accounts. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that is configured to dynamically manage user accounts. If the BIG-IP appliance is not configured to use a properly configured authentication server to dynamically manage user accounts, this is a finding.
Fix: F-65829r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to dynamically manage user accounts.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- F5BI-DM-000229
- Vuln IDs
-
- V-60215
- Rule IDs
-
- SV-74645r1_rule
Checks: C-61139r1_chk
Verify the BIG-IP appliance is configured to use an authentication server that allows the use of a temporary password for system logons with an immediate change to a permanent password. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that allows the use of a temporary password for system logons with an immediate change to a permanent password. If the BIG-IP appliance is not configured to authenticate through an authentication server that allows the use of a temporary password for system logons with an immediate change to a permanent password, this is a finding.
Fix: F-65831r1_fix
Configure the BIG-IP appliance to use an authentication server that allows the use of a temporary password for system logons with an immediate change to a permanent password.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-002385
- Version
- F5BI-DM-000239
- Vuln IDs
-
- V-60217
- Rule IDs
-
- SV-74647r1_rule
Checks: C-61145r2_chk
Verify the BIG-IP appliance is configured to protect against or to limit the effects of DoS attacks by limiting the number of concurrent sessions. Review organizational Standard Operating Procedures (SOP) to ensure there is an organizational-defined threshold for the number of allowed connections to the management console. Navigate to the BIG-IP System manager >> System >> Preferences. Set "System Settings:" to "Advanced". Verify "Maximum HTTP Connections To Configuration Utility" is set to the number of allowed connections defined in the local SOP. If the BIG-IP appliance is not configured to protect against or limit the effects of DoS attacks by limiting the number of concurrent sessions, this is a finding.
Fix: F-65833r1_fix
Configure the BIG-IP appliance to limit the effects of DoS attacks by employing security safeguards to limit the number of concurrent sessions to the configuration utility.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- F5BI-DM-000257
- Vuln IDs
-
- V-60219
- Rule IDs
-
- SV-74649r1_rule
Checks: C-61147r1_chk
Verify the BIG-IP appliance is configured to off-load audit records onto a different system or media than the system being audited. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a syslog destination is configured that off-loads audit records from the BIG-IP appliance that is different from the system being audited. If BIG-IP appliance is not configured to off-load audit records onto a different system or media, this is a finding.
Fix: F-65835r1_fix
Configure the BIG-IP appliance to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000259
- Vuln IDs
-
- V-60221
- Rule IDs
-
- SV-74651r1_rule
Checks: C-61149r1_chk
Verify the BIG-IP appliance is configured in accordance with the security configuration settings based on applicable DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If the BIG-IP appliance is not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-65837r1_fix
Configure the BIG-IP appliance to be in compliance with the applicable security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- F5BI-DM-000261
- Vuln IDs
-
- V-60223
- Rule IDs
-
- SV-74653r1_rule
Checks: C-61151r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that notifies the administrator of the number of successful logon attempts occurring during an organization-defined time period. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that notifies the administrator of the number of successful logon attempts occurring during an organization-defined time period. If the BIG-IP appliance is not configured to use a properly configured authentication server to notify the administrator of the number of successful logon attempts occurring during an organization-defined time period, this is a finding.
Fix: F-65839r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to notify the administrator of the number of successful logon attempts occurring during an organization-defined time period.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000263
- Vuln IDs
-
- V-60225
- Rule IDs
-
- SV-74655r1_rule
Checks: C-61153r1_chk
Verify the BIG-IP appliance is configured to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Log Destinations. Verify a log destination is configured for a CNDSP or other mechanism that is monitored by security personnel. If the BIG-IP appliance is not configured to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B, this is a finding.
Fix: F-65841r1_fix
Configure the BIG-IP appliance to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000269
- Vuln IDs
-
- V-60227
- Rule IDs
-
- SV-74657r1_rule
Checks: C-61155r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to centrally manage authentication settings. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that employs automated mechanisms to centrally manage authentication settings. If authentication settings are not managed centrally using automated mechanisms, this is a finding.
Fix: F-65843r1_fix
Configure the BIG-IP appliance to use an approved remote authentication server to employ automated mechanisms to centrally manage authentication settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000271
- Vuln IDs
-
- V-60229
- Rule IDs
-
- SV-74659r1_rule
Checks: C-61157r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to centrally apply authentication settings. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that employs automated mechanisms to centrally apply authentication settings. If authentication settings are not applied centrally using automated mechanisms, this is a finding.
Fix: F-65845r1_fix
Configure the BIG-IP appliance to use an approved remote authentication server to employ automated mechanisms to centrally apply authentication settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000273
- Vuln IDs
-
- V-60231
- Rule IDs
-
- SV-74661r1_rule
Checks: C-61159r1_chk
Verify the BIG-IP appliance is configured to use a remote authentication server to centrally verify authentication settings. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify that "User Directory" is set to an approved authentication server type that employs automated mechanisms to centrally verify authentication settings. If authentication settings are not verified centrally using automated mechanisms, this is a finding.
Fix: F-65847r1_fix
Configure the BIG-IP appliance to use an approved remote authentication server to employ automated mechanisms to centrally verify authentication settings.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- F5BI-DM-000277
- Vuln IDs
-
- V-60233
- Rule IDs
-
- SV-74663r1_rule
Checks: C-61161r1_chk
Verify the BIG-IP appliance is capable of creating backups of system-level information contained in the information system when changes occur. Navigate to the BIG-IP System manager >> System >> Archives. Review the list of archives to verify backups are conducted in accordance with the local backup policy. If the BIG-IP appliance does not support the creating backups of system-level information contained in the information system when changes occur or weekly, this is a finding.
Fix: F-65849r1_fix
Configure the BIG-IP appliance to create backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000279
- Vuln IDs
-
- V-60235
- Rule IDs
-
- SV-74665r1_rule
Checks: C-61163r1_chk
Verify the BIG-IP appliance is configured to off-load logs to a remote log server when changes occur. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Remote Logging. Verify a log destination is configured to allow for backups of information system documentation when changes occur. If the BIG-IP appliance does not backup the information system documentation, including security-related documentation, when changes occur, this is a finding.
Fix: F-65851r1_fix
Configure the BIG-IP appliance to create backups of information system documentation, including security-related documentation, when changes occur.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000281
- Vuln IDs
-
- V-60237
- Rule IDs
-
- SV-74667r1_rule
Checks: C-61165r1_chk
Verify the BIG-IP appliance is configured to employ automated mechanisms to assist in the tracking of security incidents. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Log Destinations. Verify a log destination is configured for a system that employs automated mechanisms to assist in the tracking of security incidents. If such automated mechanisms are not employed, this is a finding.
Fix: F-65853r1_fix
Configure the BIG-IP appliance to direct logs to a system that employs automated mechanisms to assist in the tracking of security incidents.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- F5BI-DM-000283
- Vuln IDs
-
- V-60239
- Rule IDs
-
- SV-74669r1_rule
Checks: C-61167r1_chk
Verify the BIG-IP appliance is configured to obtain public key certificates from an appropriate certificate policy through a DoD-approved service provider. Navigate to the BIG-IP System manager >> System >> Device Certificates >> Device Certificate. Verify the device certificate has been obtained from an approved service provider. If the BIG-IP appliance does not obtain its public key certificates from an appropriate certificate policy through a DoD-approved service provider, this is a finding.
Fix: F-65855r1_fix
Configure the BIG-IP appliance to obtain its public key certificates from an appropriate certificate policy through a DoD-approved service provider.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- F5BI-DM-000033
- Vuln IDs
-
- V-60241
- Rule IDs
-
- SV-74671r1_rule
Checks: C-61169r1_chk
Verify the BIG-IP appliance is configured to present a DoD-approved banner formatted in accordance with DTM-08-060. Navigate to the BIG-IP System manager >> System >> Preferences. Verify "Show The Security Banner On The Login Screen" is Enabled. Review the "Security Banner Text To Show On The Login Screen" under the "Security Settings" section for the following verbiage: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." If such a banner is not presented, this is a finding.
Fix: F-65857r1_fix
Configure the BIG-IP appliance to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- F5BI-DM-000111
- Vuln IDs
-
- V-60249
- Rule IDs
-
- SV-74679r1_rule
Checks: C-61171r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforce password complexity by requiring that at least one upper-case character be used. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces password complexity by requiring that at least one upper-case character be used. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces password complexity by requiring that at least one upper-case character be used, this is a finding.
Fix: F-65865r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce password complexity by requiring that at least one upper-case character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- F5BI-DM-000115
- Vuln IDs
-
- V-60251
- Rule IDs
-
- SV-74681r1_rule
Checks: C-61173r3_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces password complexity by requiring that at least one numeric character be used. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces password complexity by requiring that at least one numeric character be used. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces password complexity by requiring that at least one numeric character be used, this is a finding.
Fix: F-66051r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- F5BI-DM-000125
- Vuln IDs
-
- V-60253
- Rule IDs
-
- SV-74683r1_rule
Checks: C-61175r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that enforces 24 hours/1 day as the minimum password lifetime. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that enforces 24 hours/1 day as the minimum password lifetime. If the BIG-IP appliance is not configured to use a properly configured authentication server that enforces 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-65867r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server that enforces 24 hours/1 day as the minimum password lifetime.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- F5BI-DM-000135
- Vuln IDs
-
- V-60255
- Rule IDs
-
- SV-74685r1_rule
Checks: C-61177r1_chk
Verify the BIG-IP appliance is configured to use a properly configured authentication server that uses mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. Navigate to the BIG-IP System manager >> System >> Users >> Authentication. Verify "Authentication: User Directory" is configured for an approved remote authentication server that uses mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. If the BIG-IP appliance is not configured to use a properly configured authentication server that uses mechanisms that meet the requirements for authentication to a cryptographic module, this is a finding.
Fix: F-65869r1_fix
Configure the BIG-IP appliance to use a properly configured authentication server that uses mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
- RMF Control
- Severity
- M
- CCI
- Version
- F5BI-DM-000284
- Vuln IDs
-
- V-97729
- Rule IDs
-
- SV-106833r1_rule
Checks: C-96557r1_chk
Verify the F5 BIG-IP shell is locked down to limit the ability to modify the configuration through the shell. Log in to the Configuration utility as the administrative user. Navigate to System > Platform. Under Root Account, verify the Disable login and Disable bash check boxes are checked. If the value of systemauth.disablerootlogin and db systemauth.disablebash is not set to “true”, then this is a finding.
Fix: F-103397r1_fix
To ensure that the F5 BIG-IP meets the requirements within the STIG, limit the ability to modify the configuration at the command line. SSH into the command line interface and type in the following commands. (tmos)# modify sys db systemauth.disablerootlogin value true (tmos)# modify sys db systemauth.disablebash value true (tmos)# save sys config