HPE Nimble Storage Array NDM Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- HPEN-NM-000010
- Vuln IDs
-
- V-252186
- Rule IDs
-
- SV-252186r879513_rule
Checks: C-55642r814036_chk
Type "group --info | grep inactivity" and review the timeout value. If it is greater than 15 minutes, this is a finding.
Fix: F-55592r814037_fix
Type "group --edit --inactivity_timeout 15".
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- HPEN-NM-000020
- Vuln IDs
-
- V-252187
- Rule IDs
-
- SV-252187r879546_rule
Checks: C-55643r814039_chk
Type "userpolicy --info" and review output for line: "Number of authentication attempts". If the value is 2 or less, this is not a finding.
Fix: F-55593r814040_fix
Type "userpolicy --edit --allowed_attempts 2".
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- HPEN-NM-000030
- Vuln IDs
-
- V-252188
- Rule IDs
-
- SV-252188r879547_rule
Checks: C-55644r814042_chk
Attempt a login to NimOS by typing "ssh username@array", where username is a valid user, and array is an array DNS name. If the correct DoD banner is not displayed before a password prompt, this is a finding.
Fix: F-55594r814043_fix
Type "group --edit --login_banner", and then copy-paste or type the required banner. Then, to display the banner before login, type "group --edit --login_banner_after_auth no".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- HPEN-NM-000040
- Vuln IDs
-
- V-252189
- Rule IDs
-
- SV-252189r879554_rule
Checks: C-55645r814045_chk
Attempt to login using SSH to a configured array using username "admin" and password "admin". If the login is successful, this is a finding.
Fix: F-55595r814046_fix
On an unconfigured array, the setup command requires the "--password <new password>" argument to be supplied. To fix an already configured array: after logging into the array as the "admin" user, type "useradmin --passwd", and enter the old and new passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- HPEN-NM-000050
- Vuln IDs
-
- V-252190
- Rule IDs
-
- SV-252190r879601_rule
Checks: C-55646r814048_chk
Type "userpolicy --info" and review output for line: "Minimum Length". If it is 15 or more, this is not a finding.
Fix: F-55596r814049_fix
Set minimum password length to 15 by typing "userpolicy --edit --min_length 15".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- HPEN-NM-000060
- Vuln IDs
-
- V-252191
- Rule IDs
-
- SV-252191r879603_rule
Checks: C-55647r814051_chk
Type "userpolicy --info" and review output for line: "Minimum Uppercase characters". If it is 1 or more, this is not a finding.
Fix: F-55597r814052_fix
Set minimum number of uppercase characters to 1 by typing "userpolicy --edit --upper 1".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- HPEN-NM-000070
- Vuln IDs
-
- V-252192
- Rule IDs
-
- SV-252192r879604_rule
Checks: C-55648r814054_chk
Type "userpolicy --info" and review output for line: "Minimum Lowercase characters". If it is 1 or more, this is not a finding.
Fix: F-55598r814055_fix
Set minimum number of lowercase characters to 1 by typing "userpolicy --edit --lower 1".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- HPEN-NM-000080
- Vuln IDs
-
- V-252193
- Rule IDs
-
- SV-252193r879605_rule
Checks: C-55649r814057_chk
Type "userpolicy --info" and review output for line: "Minimum Digits". If it is 1 or more, this is not a finding.
Fix: F-55599r814058_fix
Set minimum number of numeric characters to 1 by typing "userpolicy --edit --digit 1".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- HPEN-NM-000090
- Vuln IDs
-
- V-252194
- Rule IDs
-
- SV-252194r879606_rule
Checks: C-55650r814060_chk
Type "userpolicy --info" and review output for line: "Minimum Special characters". If it is 1 or more, this is not a finding.
Fix: F-55600r814061_fix
Set minimum number of special characters to 1 by typing "userpolicy --edit --special 1".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- HPEN-NM-000100
- Vuln IDs
-
- V-252195
- Rule IDs
-
- SV-252195r879607_rule
Checks: C-55651r814063_chk
Type "userpolicy --info" and review output for line: "Minimum number of characters change from previous password". If it is 8 or more, this is not a finding.
Fix: F-55601r814064_fix
Set minimum number of characters changed from previous password to 8 by typing "userpolicy --edit --previous_diff 8".
- RMF Control
- SC-10
- Severity
- H
- CCI
- CCI-001133
- Version
- HPEN-NM-000110
- Vuln IDs
-
- V-252196
- Rule IDs
-
- SV-252196r916342_rule
Checks: C-55652r814066_chk
Type "group --info | grep inactivity" and review the timeout value. If it is greater than 10 minutes, this is a finding.
Fix: F-55602r814067_fix
To set the inactivity timeout to 10 minutes, type "group --edit --inactivity_timeout 10".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- HPEN-NM-000120
- Vuln IDs
-
- V-252197
- Rule IDs
-
- SV-252197r916111_rule
Checks: C-55653r814069_chk
Run the command "userauth --list". If the output is "No domains configured", this is a finding.
Fix: F-55603r814070_fix
To configure AD, run the following commands: "userauth --join <domain> --domain_user administrator" and enter the domain administrator password to join <domain>. "userauth --list" will show the domain and its status. To create a mapping between an AD group and one of the four device RBAC roles, run the following command: "userauth --add_group <domain_group> --domain <domain> --role {administrator|poweruser|operator|guest}" This command allows any member of <domain_group> in <domain> AD domain to log in to the device with one of the selected roles. To display the group to role mappings, run "userauth --list_group --domain <domain>".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HPEN-NM-000130
- Vuln IDs
-
- V-252198
- Rule IDs
-
- SV-252198r879887_rule
Checks: C-55654r814072_chk
Type "cert --list". Review the output to confirm that the custom-ca and custom certificates exist, and the "Use" values specified for HTTPS and APIS are both "custom". If not, this is a finding.
Fix: F-55604r814073_fix
To create and import a custom, CA-signed certificate follow these steps: 1. Type "cert --gen custom-csr". Copy the displayed CSR and submit it to an appropriate signing authority. 2. Type "cert --import custom-ca" and paste the PEM-encoded CA certificate chain as input to the command. 3. Type "cert --import custom" and paste the signed certificate obtained from the CA.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- HPEN-NM-000140
- Vuln IDs
-
- V-252199
- Rule IDs
-
- SV-252199r916114_rule
Checks: C-55655r814075_chk
Type "group --info | grep -i syslog" and review the output lines. The "Syslogd enabled" value should be "Yes", and the "Syslogd server" and "Syslogd port" values should contain the correct syslog server and port values. If not, this is a finding.
Fix: F-55605r814076_fix
Configure email alerts (optional) group--edit [--smtp_serversmtp server] [--smtp_portsmtp port] [--smtp_auth {yes | no}] [--smtp_username username] --smtp_encrypt_type ssl [--smtp_from_addr email addr] [--smtp_to_addr email addr] [--send_event_data {yes | no}] [--alert_level {info | warning | critical}] To specify and enable logging of alerts, type "group --edit --syslog_enabled yes --syslog_server <server> --syslog_port <port>", where <server> and <port> are the server DNS name or IP address, and <port> is the port to send syslog messages to.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- HPEN-NM-000150
- Vuln IDs
-
- V-252200
- Rule IDs
-
- SV-252200r879887_rule
Checks: C-55656r817263_chk
Log in to https://infosight.hpe.com using HPE Passport credentials. Click on the Main Menu icon in the upper left corner. Select Resources >> Alletra 6000, Nimble Storage >> Documentation. Determine current array OS version using User Interface (UI). Refer to Nimble "GUI Administration Guide" Version: NOS 5.2.x, section "Hardware and Software Updates", subsection "Find the Array OS Version" to determine the version of the OS that is currently in use by the array. Determine available array OS update versions using InfoSight. *Any version of Nimble OS software greater than the "current array OS version" might qualify to be an update to the "current array OS version". The option exists to bypass several releases to come up to the newest available release depending upon requirements. *Call HPE Support with any questions about choosing an appropriate release or the process to upgrade a release. - Follow above instructions to log in to HPE InfoSight. - Choose a "Software Version" from the left panel equal to or greater than the current array OS version. For example, 5.2.x would be equal to the current version and 5.3.x would be greater than the current version. - Open the Release Notes document for each version that is greater than the current array OS version. For example, "NimbleOS Release Notes Version NOS 5.2.1.700" is greater than NOS 5.2.1.600. - Review the entire release notes document. - Determine if this is a release should be used for an upgrade. - Confirm that the "From Version", for example 5.2.1.600, can be used to go to the version for which the release notes are applicable; for example 5.2.1.700. If the operating system version is no longer supported by the vendor, this is a finding.
Fix: F-55606r817259_fix
To upgrade to a supported version, type "software --list". Select the last version listed with at least number 5.2.x. Type "software --download <version<, where <version< is the version selected. After the download is complete, type "software --update" and accept the terms and conditions. The update progress can be monitored using "software --update_status". Once finished, use "version" to verify that the new software has been installed correctly.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- HPEN-NM-000160
- Vuln IDs
-
- V-252201
- Rule IDs
-
- SV-252201r879511_rule
Checks: C-55657r814081_chk
Verify that in Administration >> Security Policies page in the UI, "Unlimited" for the number of sessions is unchecked and a limit is specified. If a limit is not specified, this is a finding.
Fix: F-55607r814082_fix
On the Administration >> Security Policies page in the UI, uncheck "Unlimited" for the number of sessions and specify a new limit.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HPEN-NM-000271
- Vuln IDs
-
- V-252202
- Rule IDs
-
- SV-252202r879746_rule
Checks: C-55658r851190_chk
To Determine if the HPE Nimble Array is configured to synchronize internal information system clocks with the primary NTP server: ArrayA:/# ntpq ntpq> sysinfo associd=0 status=0615 leap_none, sync_ntp, 1 event, clock_sync, system peer: cxo-nmbldc-01.nimblestorage.com:123 system peer mode: client leap indicator: 00 stratum: 4 log2 precision: -24 root delay: 37.321 root dispersion: 265.639 reference ID: 10.157.24.95 reference time: e509b178.9f897118 Thu, Oct 7 2021 11:48:40.623 system jitter: 0.000000 clock jitter: 0.673 clock wander: 0.003 broadcast delay: -50.000 symm. auth. delay: 0.000 If the HPE Storage Array is not configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources, this is a finding.
Fix: F-55608r814085_fix
Configure the HPE Nimble Array to synchronize internal information system clocks with the primary time source: ArrayA:/# group --edit --ntpserver <ip_address_of_ntp_server> There would be a finding here given we only support primary ntp source.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- HPEN-NM-000300
- Vuln IDs
-
- V-252203
- Rule IDs
-
- SV-252203r879886_rule
Checks: C-55659r814087_chk
Type "group --info | grep -i syslog" and review the output lines. The "Syslogd enabled" value should be "Yes", and the "Syslogd server" and "Syslogd port" values should contain the correct syslog server and port values. If not, this is a finding.
Fix: F-55609r814088_fix
To specify and enable logging of alerts, type "group --edit --syslog_enabled yes --syslog_server <server> --syslog_port <port>", where <server> and <port> are the server DNS name or IP address, and <port> is the port to send syslog messages to.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- HPEN-NM-000221
- Vuln IDs
-
- V-252902
- Rule IDs
-
- SV-252902r879588_rule
Checks: C-56357r822430_chk
Navigate to Administration >> Alerts and Monitoring page of the storage array management interface. Verify the checkbox is not checked. If HPE InfoSight is enabled, this is a finding.
Fix: F-56307r822431_fix
In HPE Nimble Storage arrays, data collection is disabled by default. Navigate to Administration >> Alerts and Monitoring page of the storage array management interface. Uncheck the checkbox.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- HPEN-NM-000222
- Vuln IDs
-
- V-259800
- Rule IDs
-
- SV-259800r944374_rule
Checks: C-63531r944371_chk
Ensure cloud console is disabled. Type "group --info |grep -i "cloud enabled". If the response is "cloud enabled: Yes", this is a finding.
Fix: F-63438r944372_fix
Disable cloud console Navigate to Administration >> Customization >> Data Services Cloud Console. Uncheck "Connect to Data Services Cloud Console".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- HPEN-NM-000223
- Vuln IDs
-
- V-259801
- Rule IDs
-
- SV-259801r944975_rule
Checks: C-63532r944376_chk
Verify cloud console is disabled. Type "group --info |grep -i "cloud enabled". If the response is "cloud enabled: Yes", this is a finding.
Fix: F-63439r944975_fix
Disable Alletra cloud console. Type "group --edit --cloud_management off". If the response is as follows, contact your HPE sales account team to request approval: "ERROR: Failed to change system configuration. Updating cloud management is not permitted."