Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Verify that SSMC displays the Standard Mandatory DOD Notice and Consent Banner before granting access to the system by following below steps: 1. Log on to SSMC Web Administrator console GUI as "ssmcadmin". 2. Navigate to Actions >> Preferences >> Application. 3. Check if the login banner slider is toggled to "yes" and the desired text in English is set in the textbox adjacent to the control. If the custom banner text is not set to the Standard Mandatory DOD Notice and Consent Banner, this is a finding.
Configure SSMC to display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system by following below steps: 1. Log on to SSMC Web Administrator console GUI as "ssmcadmin". 2. Navigate to Actions >> Preferences >> Application. 3. Toggle the Login banner slider to "Yes" and enter the standard DOD banner message text (Only English is supported). 4. Click "OK" to Save your changes.
Verify that SSMC displays the full text of the Standard Mandatory DOD Notice and Consent Banner before granting access to the system. 1. Access the SSMC web application by submitting the URL https://<ssmc_ip_or_fqdn>:8443/. 2. Log on to SSMC admin console as ssmcadmin. 3. Navigate to Action >> Preferences. Verify that the full text of the Standard Mandatory DOD Notice and consent banner is seen as stored against Custom Banner field. The DOD Notice and consent banner message should read as follows in all of steps 1, 2 and 3 above: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." If the full text of the Standard Mandatory DOD Notice and Consent Banner is not displayed, this is a finding.
Configure SSMC to display the full text of the Standard Mandatory DOD Notice and Consent Banner before granting access to the system. Log on to SSMC admin console as ssmcadmin; navigate to Action >> Preferences. Enable custom banner slider switch and set the following as banner text: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details."
Verify that SSMC is configured to strong SSH ciphers to protect the integrity of remote access sessions by doing the following: Log on to SSMC appliance as ssmcadmin via SSH, press "X" to escape to general bash shell from the TUI menu, and issue the following command: $ sudo /ssmc/bin/config_security.sh -o cnsa_mode_appliance -a status If the output does not read as "Appliance CNSA mode is enabled", this is a finding.
Configure SSMC to use Strong SSH ciphers to protect the integrity of remote access sessions by doing the following: 1. Log on to the SSMC administrator console as "ssmcadmin". Press "X" to escape to general bash shell. 2. Execute the following command: $ sudo /ssmc/bin/config_security.sh -o cnsa_mode_appliance -a enable -f
Verify that SSMC enforces a delay of at least four seconds between logon prompts following a failed logon attempt. To do so, perform the following steps. 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Execute the following command: $ sudo /ssmc/bin/config_security.sh -o config_failedlogin_delay -a status Failed login delay is enabled If the command output does not read "Failed login delay is enabled", this is a finding.
Configure SSMC to enforce a delay of at least four seconds between logon prompts following a failed logon attempt. To do so, perform the following steps. 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Execute the following command: $ sudo /ssmc/bin/config_security.sh -o config_failedlogin_delay -a enable -f
To verify that the 15-character minimum password length policy is set, do the following: 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to shell. 2. Execute the following command: $ sudo /ssmc/bin/config_security.sh -o long_password_policy -a status Long password policy is enabled If the status does not read "enabled", this is a finding.
To enable and enforce the 15-character minimum password length policy, do the following: 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Execute the following command: $ sudo /ssmc/bin/config_security.sh -o long_password_policy -a enable -f Note: ssmcaudit user should be disabled before executing this fix procedure.
To verify that SSMC is configured to prevent exfiltration of sensitive information, do the following: 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Execute the following command: $ grep ^ssmc.management.notification.disable /opt/hpe/ssmc/ssmcbase/resources/ssmc.properties ssmc.management.notification.disable=false If the command output does not print "ssmc.management.notification.disable=false", this is a finding.
To configure SSMC to prevent exfiltration of sensitive information, disable all management email notifications. Execute the following steps: 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Edit /opt/hpe/ssmc/ssmcbase/resources/ssmc.properties using vi editor. 3. Locate and uncomment the property "ssmc.management.notification.disable=false". Save and exit. 4. Using TUI menu option 2, restart SSMC service.
Verify that SSMC is configured to offload logs to a SIEM that is set up to alert the ISSO or SA when the ssmcadmin account is accessed by performing the following: 1. Log on to SIEM where the logs are being offloaded. 2. Log on to SSMC with the ssmcadmin account. 3. Return to the SIEM to see that an alert has been generated based on the access of the ssmcadmin account. If the SIEM does not generate an alert for the ISSO or SA, this is a finding.
Configure SSMC to offload logs to a SIEM that is set up to alert the ISSO or SA when the ssmcadmin account is accessed by performing the following: 1. Implement SSMC-WS-010080 to establish offloading logs to a SIEM. 2. Configure the SIEM to alert the ISSO or SA in the event that the ssmcadmin account is accessed.
Verify SSMC synchronizes system clocks to the authoritative time source by performing the following: 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Execute the following command: $ sudo /ssmc/bin/config_security.sh -o configure_ntp -a status NTP service is configured If the NTP service is not configured, this is a finding.
Configure SSMC to synchronize system clock to the authoritative time source by doing the following: 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Edit /ssmc/conf/security_config.properties using vi editor and configure the IP address of one or more time servers with which the system clock needs to be synchronized via NTP. Save and exit. 3. Execute the following command: $ sudo /ssmc/bin/config_security.sh -o configure_ntp -a set -f
Check that the remote syslog connection is configured to use "x509/certvalid" or "x509/name" as authentication mode: $ sudo /ssmc/bin/config_security.sh -o remote_syslog_appliance -a status | grep ssmc.rsyslog.server.authMode Expected: ssmc.rsyslog.server.authMode=x509/name OR ssmc.rsyslog.server.authMode=x509/certvalid If the output does not match either of the expected strings, it is a finding.
Configure SSMC to perform PKI-based authentication for remote syslog connectivity with "x509/certvalid" or "x509/name" setting for auth mode: 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Use vi to edit and configure /ssmc/conf/security_config.properties file with values necessary to connect with a remote syslog server. ssmc.rsyslog.server.host=<rsyslog_server> ssmc.rsyslog.server.port=<rsyslog_port> ssmc.rsyslog.server.protocol=tcp ssmc.rsyslog.server.tls-enabled=1 ssmc.rsyslog.cert.caroot=<ca_root_cert_pem> ssmc.rsyslog.cert.clientcert=<ssmc_client_cert_pem> ssmc.rsyslog.cert.clientkey=<ssmc_client_key_pem> ssmc.rsyslog.server.authMode=< x509/name | x509/certvalid > ssmc.rsyslog.server.permittedPeers=<cn_of_rsyslog_server> ssmc.rsyslog.server.device=<ens160|ens192|eth0|eth1> ssmc.rsyslog.queue.maxdiskspace=6 Save and exit. 3. Execute the following to activate connection to remote syslog server: $ sudo /ssmc/bin/config_security.sh -o remote_syslog_server -a set -f
Check if SSMC is configured to limit consecutive invalid logon attempts for ssmcaudit user to three times by executing the following command: $ sudo /ssmc/bin/config_security.sh -o session_lock -a status Session lock is enabled If the output of this command does not read "Session lock is enabled", this is a finding.
Configure SSMC to limit consecutive invalid logon attempts for ssmcaudit user to three times by executing the following command: $sudo /ssmc/bin/config_security.sh -o session_lock -a enable -f
Verify that SSMC web server is configured to close inactive sessions after 10 minutes by doing the following: 1. Log on to the SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Execute the command: $ grep ^server.session.timeout /opt/hpe/ssmc/ssmcbase/resources/ssmc.properties server.session.timeout=10 If the value is not set to 10 minutes, this is a finding.
Configure SSMC web server to close inactive sessions after 10 minutes by doing the following: 1. Log on to the SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Use vi to edit /opt/hpe/ssmc/ssmcbase/resources/ssmc.properties file. 3. Uncomment and update server.session.timeout property to 10 minutes (default is 15). Save and exit. 4. Type "config_appliance" to return to TUI. Restart (stop and start) SSMC services using TUI menu option 2.
Verify that SSMC prevents nonprivileged users from executing privileged functions by doing the following: 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Execute the following commands: $ sudo /ssmc/bin/config_security.sh -o sudo_password -a status Sudo password is enabled If the command output does not read "Sudo password is enabled", this is a finding.
Configure SSMC to prevent nonprivileged users from executing privileged functions by doing the following: 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Execute the following command: $ sudo /ssmc/bin/config_security.sh -o sudo_password -a enable
Verify that SSMC provides audit record generation capability for DOD-defined auditable events for all operating system components, by executing the following command: $ sudo /ssmc/bin/config_security.sh -o verbose_shell_session_logs -a status Verbose shell session log is enabled If the command outputs do not read as "enabled", this is a finding.
Configure SSMC to provide audit record generation capability for DOD-defined auditable events for all operating system components by executing the following command: $ sudo /ssmc/bin/config_security.sh -o verbose_shell_session_logs -a enable -f
Verify SSMC allocates audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to remote logging server by doing the following: 1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell. 2. Execute the following command: $ sudo /ssmc/bin/config_security.sh -o remote_syslog_appliance -a status | grep ssmc.rsyslog.queue.maxdiskspace ssmc.rsyslog.queue.maxdiskspace=6 If the command output does not read "ssmc.rsyslog.queue.maxdiskspace=6", this is a finding.
Configure SSMC to allocate audit record storage capacity to store at least one week's worth of audit records. Perform the following to do so: 1. Configure smtp parameters in /ssmc/conf/security_config.properties like below (use vi editor) - ssmc.rsyslog.server.host=<rsyslog_server> ssmc.rsyslog.server.port=<rsyslog_port> ssmc.rsyslog.server.protocol=tcp ssmc.rsyslog.server.tls-enabled=1 ssmc.rsyslog.cert.caroot=<ca_root_cert_pem> ssmc.rsyslog.cert.clientcert=<ssmc_client_cert_pem> ssmc.rsyslog.cert.clientkey=<ssmc_client_key_pem> ssmc.rsyslog.server.authMode=<x509/name | x509/certvalid> ssmc.rsyslog.server.permittedPeers=<cn_of_rsyslog_server> ssmc.rsyslog.server.device=<ens160|ens192|eth0|eth1> ssmc.rsyslog.queue.maxdiskspace=6 ssmc.rsyslog.smtp.alert=true ssmc.rsyslog.smtp.server=<server_ip> ssmc.rsyslog.smtp.port=25 ssmc.rsyslog.smtp.recipient=["id1@domain","id2@domain"] ssmc.rsyslog.smtp.notify-interval=300 ssmc.rsyslog.smtp.mailFrom=id@domain 2. Execute the following command to commit configuration and activate the service: $ sudo /ssmc/bin/config_security.sh -o remote_syslog_appliance -a set -f