HP FlexFabric Switch NDM Security Technical Implementation Guide

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]

Details

Version / Release: V1R3

Published: 2020-06-03

Updated At: 2020-08-15 20:22:23

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-80453r1_rule HFFS-ND-000001 CCI-000054 LOW The HP FlexFabric Switch must limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type. Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administrator is helpful in limiting risks related to DoS attacks.
    SV-80631r1_rule HFFS-ND-000008 CCI-000017 LOW The HP FlexFabric Switch must automatically disable accounts after a 35-day period of account inactivity. Since the accounts in the HP FlexFabric Switch are privileged or system-level accounts, account management is vital to the security of the HP FlexFabric Switch. Inactive accounts could be reactivated or compromised by unauthorized users, allowing exploita
    SV-80633r1_rule HFFS-ND-000009 CCI-000018 MEDIUM The HP FlexFabric Switch must automatically audit account creation. Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. Notification of account creation helps to mitigate this risk. Audi
    SV-80635r1_rule HFFS-ND-000010 CCI-001403 MEDIUM The HP FlexFabric Switch must automatically audit account modification. Since the accounts in the HP FlexFabric Switch are privileged or system-level accounts, account management is vital to the security of the HP FlexFabric Switch. Account management by a designated authority ensures access to the HP FlexFabric Switch is bei
    SV-80637r1_rule HFFS-ND-000011 CCI-001404 MEDIUM The HP FlexFabric Switch must automatically audit account disabling actions. Account management, as a whole, ensures access to the HP FlexFabric Switch is being controlled in a secure manner by granting access to only authorized personnel. Auditing account disabling actions will support account management procedures. When device m
    SV-80639r1_rule HFFS-ND-000012 CCI-001405 MEDIUM The HP FlexFabric Switch must automatically audit account removal actions. Account management, as a whole, ensures access to the HP FlexFabric Switch is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will support account management procedures. When device man
    SV-80641r1_rule HFFS-ND-000013 CCI-000213 HIGH The HP FlexFabric Switch must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device. To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems must be properly configured to incorporate access control methods that do not rely solely on the poss
    SV-80643r1_rule HFFS-ND-000014 CCI-001368 MEDIUM The HP FlexFabric Switch must enforce approved authorizations for controlling the flow of management information within the HP FlexFabric Switch based on information flow control policies. A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design. If management information flow is not enforced based on approved authorizations, the HP FlexFabric Switch may become compromised
    SV-80645r1_rule HFFS-ND-000015 CCI-000044 MEDIUM The HP FlexFabric Switch must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
    SV-80647r1_rule HFFS-ND-000016 CCI-000048 MEDIUM The HP FlexFabric Switch must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device. Display of the DoD-approved use notification before granting access to the HP FlexFabric Switch ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standa
    SV-80649r1_rule HFFS-ND-000017 CCI-000050 MEDIUM The HP FlexFabric Switch must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access. The banner must be acknowledged by the administrator prior to allowing the administrator access to the HP FlexFabric Switch. This provides assurance that the administrator has seen the message and accepted the conditions for access. If the consent banner
    SV-80651r1_rule HFFS-ND-000018 CCI-000052 MEDIUM Upon successful logon, the HP FlexFabric Switch must notify the administrator of the date and time of the last logon. Administrators need to be aware of activity that occurs regarding their network device management account. Providing administrators with information regarding the date and time of their last successful logon allows them to determine if any unauthorized ac
    SV-80653r1_rule HFFS-ND-000019 CCI-000053 MEDIUM Upon successful logon, the HP FlexFabric Switch must notify the administrator of the number of unsuccessful logon attempts since the last successful logon. Administrators need to be aware of activity that occurs regarding their network device management account. Providing administrators with information regarding the number of unsuccessful attempts made to logon to their account allows them to determine if a
    SV-80655r1_rule HFFS-ND-000021 CCI-000166 LOW The HP FlexFabric Switch must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. This requirement supports non-repudiation of actions taken by an administrator and is required in order to maintain the integrity of the configuration management process. All configuration changes to the HP FlexFabric Switch are logged, and administrators
    SV-80657r1_rule HFFS-ND-000022 CCI-000169 LOW The HP FlexFabric Switch must provide audit record generation capability for DoD-defined auditable events within the HP FlexFabric Switch. Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the
    SV-80661r1_rule HFFS-ND-000024 CCI-000172 MEDIUM The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to access privileges occur. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit reco
    SV-80663r1_rule HFFS-ND-000025 CCI-001464 LOW The HP FlexFabric Switch must initiate session auditing upon startup. If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enabled before a given process is created.
    SV-80665r1_rule HFFS-ND-000026 CCI-000130 LOW The HP FlexFabric Switch must produce audit log records containing sufficient information to establish what type of event occurred. It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done in order to compile an accurate risk assessment. Associating event types with detected events in the applic
    SV-80667r1_rule HFFS-ND-000027 CCI-000131 LOW The HP FlexFabric Switch must produce audit records containing information to establish when (date and time) the events occurred. It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done in order to compile an accurate risk assessment. Logging the date and time of each detected event provides
    SV-80669r1_rule HFFS-ND-000028 CCI-000132 LOW The HP FlexFabric Switch must produce audit records containing information to establish where the events occurred. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as device hardware components, device software modules, session identifiers, filenames, host names, a
    SV-80671r1_rule HFFS-ND-000029 CCI-000133 LOW The HP FlexFabric Switch must produce audit log records containing information to establish the source of events. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know the source of the event. The source may be a component, module, or process within the device or an external session, administrato
    SV-80673r1_rule HFFS-ND-000030 CCI-000134 LOW The HP FlexFabric Switch must produce audit records that contain information to establish the outcome of the event. Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the system. Event outcomes can include indicators of event succ
    SV-80675r1_rule HFFS-ND-000031 CCI-001487 LOW The HP FlexFabric Switch must generate audit records containing information that establishes the identity of any individual or process associated with the event. Without information that establishes the identity of the subjects (i.e., administrators or processes acting on behalf of administrators) associated with the events, security personnel cannot determine responsibility for the potentially harmful event. Eve
    SV-80677r1_rule HFFS-ND-000032 CCI-000135 LOW The HP FlexFabric Switch must generate audit records containing the full-text recording of privileged commands. Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requ
    SV-80679r1_rule HFFS-ND-000035 CCI-000159 MEDIUM The HP FlexFabric Switch must use internal system clocks to generate time stamps for audit records. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, the HP FlexFabric Switch must support the organization's capability to correlate the audit log data from multiple network devices to acquire a cle
    SV-80681r1_rule HFFS-ND-000036 CCI-000162 MEDIUM The HP FlexFabric Switch must protect audit information from any type of unauthorized read access. Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. If audit data were to become compromised, then competent forensic analysis and discovery of the
    SV-80683r1_rule HFFS-ND-000037 CCI-000163 MEDIUM The HP FlexFabric Switch must protect audit information from unauthorized modification. Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit network device activity. If audit data were to become compromised, then forensic analysis and discovery of the true source of
    SV-80685r1_rule HFFS-ND-000038 CCI-000164 MEDIUM The HP FlexFabric Switch must protect audit information from unauthorized deletion. Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. If audit data were to become compromised, then forensic analysis and discovery of the true sourc
    SV-80689r1_rule HFFS-ND-000046 CCI-000382 MEDIUM The HP FlexFabric Switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable unused or unnecessary physical and logical ports/protocol
    SV-80691r1_rule HFFS-ND-000052 CCI-000795 MEDIUM The HP FlexFabric Switch must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. Inactive identifiers pose a risk to network devices. Attackers that are able to exploit an inactive identifier can potentially obtain and maintain undetected access to the device. Owners of inactive accounts will not notice if unauthorized access to their
    SV-80693r1_rule HFFS-ND-000053 CCI-000205 MEDIUM The HP FlexFabric Switch must enforce a minimum 15-character password length. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to determine strength and how long it takes to crack a passwor
    SV-80695r1_rule HFFS-ND-000054 CCI-000200 MEDIUM The HP FlexFabric Switch must prohibit password reuse for a minimum of five generations. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the
    SV-80697r1_rule HFFS-ND-000055 CCI-000192 MEDIUM If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one upper-case character be used. Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Passwor
    SV-80699r1_rule HFFS-ND-000056 CCI-000193 MEDIUM If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one lower-case character be used. Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password
    SV-80701r1_rule HFFS-ND-000057 CCI-000194 MEDIUM If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one numeric character be used. Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password
    SV-80703r1_rule HFFS-ND-000058 CCI-001619 MEDIUM If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one special character be used. Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password
    SV-80705r1_rule HFFS-ND-000062 CCI-000198 MEDIUM The HP FlexFabric Switch must enforce 24 hours/1 day as the minimum password lifetime. Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. Restricting this setting limits the user's ability to change their password. Passwords need to be changed at sp
    SV-80707r1_rule HFFS-ND-000063 CCI-000199 MEDIUM The HP FlexFabric Switch must enforce a 60-day maximum password lifetime restriction. Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals. One method of minimizing this risk is to use complex passwords and periodically change them. If the HP FlexFabric Switch does
    SV-80709r1_rule HFFS-ND-000064 CCI-000185 MEDIUM The HP FlexFabric Switch, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entity represented via a public key and associated data. It is
    SV-80711r1_rule HFFS-ND-000065 CCI-000187 MEDIUM The HP FlexFabric Switch must map the authenticated identity to the user account for PKI-based authentication. Authorization for access to any network device requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account must be bound to a user certificate when PKI-based authentication is i
    SV-80713r1_rule HFFS-ND-000069 CCI-001133 MEDIUM The HP FlexFabric Switch must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements. Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unattended. In addition, quickly terminat
    SV-80715r1_rule HFFS-ND-000082 CCI-002363 MEDIUM Network devices must provide a logoff capability for administrator-initiated communication sessions. If an administrator cannot explicitly end a device management session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session.
    SV-80717r1_rule HFFS-ND-000085 CCI-002130 MEDIUM The HP FlexFabric Switch must automatically audit account enabling actions. Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply enable a new or disabled account. Notification of account
    SV-80719r1_rule HFFS-ND-000086 CCI-002132 MEDIUM The HP FlexFabric Switch must generate an immediate alert for account enabling actions. Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply enable a new or disabled account. Notification of account
    SV-80721r1_rule HFFS-ND-000088 CCI-002165 MEDIUM If the HP FlexFabric Switch uses discretionary access control, the HP FlexFabric Switch must enforce organization-defined discretionary access control policies over defined subjects and objects. Discretionary Access Control (DAC) is based on the notion that individual network administrators are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which mode (e.g., read or write). Ownership is
    SV-80723r1_rule HFFS-ND-000089 CCI-000366 MEDIUM If the HP FlexFabric Switch uses role-based access control, the HP FlexFabric Switch must enforce organization-defined role-based access control policies over defined subjects and objects. Organizations can create specific roles based on job functions and the authorizations (i.e., privileges) to perform needed operations on organizational information systems associated with the organization-defined roles. When administrators are assigned to
    SV-80725r1_rule HFFS-ND-000092 CCI-002238 MEDIUM The HP FlexFabric Switch must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.
    SV-80727r1_rule HFFS-ND-000093 CCI-000366 MEDIUM The HP FlexFabric Switch must notify the administrator, upon successful logon (access), of the location of last logon (terminal or IP address) in addition to the date and time of the last logon (access). Administrators need to be aware of activity that occurs regarding their account. Providing them with information deemed important by the organization may aid in the discovery of unauthorized access or thwart a potential attacker. Organizations should co
    SV-80731r2_rule HFFS-ND-000095 CCI-001849 MEDIUM The HP FlexFabric Switch must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements. In order to ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able to allocate audit record storage capacity. The task of allocating audit record storage capacity is usually performed during initia
    SV-80733r1_rule HFFS-ND-000096 CCI-001855 MEDIUM The HP FlexFabric Switch must generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. If security personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for storage capacity expansion. This could lead to the loss of audit information. Note that while the HP FlexFabric Switch must genera
    SV-80735r1_rule HFFS-ND-000097 CCI-001858 MEDIUM The HP FlexFabric Switch must generate an immediate real-time alert of all audit failure events requiring real-time alerts. It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impending failure of the audit capability and system operation
    SV-80737r1_rule HFFS-ND-000098 CCI-001891 MEDIUM The HP FlexFabric Switch must compare internal information system clocks at least every 24 hours with an authoritative time server. Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events. S
    SV-80739r1_rule HFFS-ND-000099 CCI-002046 MEDIUM The HP FlexFabric Switch must synchronize internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period. Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events.
    SV-80741r1_rule HFFS-ND-000100 CCI-000366 MEDIUM The HP FlexFabric Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources. The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other functions. Multiple time sources provide redundancy by i
    SV-80743r1_rule HFFS-ND-000101 CCI-001890 MEDIUM The HP FlexFabric Switch must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Time is commonly expressed in Coordinated Universal Time (UTC
    SV-80745r1_rule HFFS-ND-000102 CCI-001889 MEDIUM The HP FlexFabric Switch must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision. Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records. Time stamps generated by the application include date and time. Granularity of time measurements refers to the degree of synchron
    SV-80747r1_rule HFFS-ND-000113 CCI-002041 MEDIUM The HP FlexFabric Switch must allow the use of a temporary password for system logons with an immediate change to a permanent password. Without providing this capability, an account may be created without a password. Non-repudiation cannot be guaranteed once an account is created if a user is not forced to change the temporary password upon initial logon. Temporary passwords are typicall
    SV-80749r1_rule HFFS-ND-000116 CCI-002890 MEDIUM Applications used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents
    SV-80751r1_rule HFFS-ND-000117 CCI-003123 MEDIUM Applications used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents
    SV-80753r1_rule HFFS-ND-000118 CCI-002385 MEDIUM The HP FlexFabric Switch must protect against or limit the effects of all known types of Denial of Service (DoS) attacks on the HP FlexFabric Switch management network by employing organization-defined security safeguards. DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This requirement addresses the configuration of network devices to mit
    SV-80755r1_rule HFFS-ND-000119 CCI-000366 MEDIUM If the HP FlexFabric Switch uses mandatory access control, the HP FlexFabric Switch must enforce organization-defined mandatory access control policies over all subjects and objects. Mandatory access control policies constrain what actions subjects can take with information obtained from data objects for which they have already been granted access, thus preventing the subjects from passing the information to unauthorized subjects and
    SV-80757r1_rule HFFS-ND-000120 CCI-000172 MEDIUM The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit recor
    SV-80759r1_rule HFFS-ND-000121 CCI-000172 MEDIUM The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit recor
    SV-80761r1_rule HFFS-ND-000122 CCI-000172 MEDIUM The HP FlexFabric Switch must generate audit records when successful/unsuccessful logon attempts occur. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit recor
    SV-80763r1_rule HFFS-ND-000123 CCI-000172 MEDIUM The HP FlexFabric Switch must generate audit records for privileged activities or other system-level access. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit recor
    SV-80765r1_rule HFFS-ND-000124 CCI-000172 MEDIUM The HP FlexFabric Switch must generate audit records showing starting and ending time for administrator access to the system. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit reco
    SV-80767r1_rule HFFS-ND-000125 CCI-000172 MEDIUM The HP FlexFabric Switch must generate audit records when concurrent logons from different workstations occur. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit recor
    SV-80769r1_rule HFFS-ND-000126 CCI-000172 MEDIUM The HP FlexFabric Switch must generate audit records for all account creations, modifications, disabling, and termination events. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit recor
    SV-80771r1_rule HFFS-ND-000127 CCI-001851 MEDIUM The HP FlexFabric Switch must off-load audit records onto a different system or media than the system being audited. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    SV-80773r1_rule HFFS-ND-000129 CCI-000366 MEDIUM The HP FlexFabric Switch must notify the administrator of the number of successful logon attempts occurring during an organization-defined time period. Administrators need to be aware of activity that occurs regarding their network device management account. Providing administrators with information regarding the date and time of their last successful logon allows the administrator to determine if any un
    SV-80775r1_rule HFFS-ND-000131 CCI-000366 MEDIUM The HP FlexFabric Switch must generate audit log events for a locally developed list of auditable events. Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity thresholds; or to identify an improperly configured netwo
    SV-80777r1_rule HFFS-ND-000132 CCI-000345 MEDIUM The HP FlexFabric Switch must enforce access restrictions associated with changes to the system components. Changes to the hardware or software components of the HP FlexFabric Switch can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the HP FlexFabr
    SV-80779r1_rule HFFS-ND-000137 CCI-000366 LOW The HP FlexFabric Switch must support organizational requirements to conduct backups of system level information contained in the information system when changes occur or weekly, whichever is sooner. System-level information includes default and customized settings and security attributes, including ACLs that relate to the HP FlexFabric Switch configuration, as well as software required for the execution and operation of the device. Information system
    SV-80781r1_rule HFFS-ND-000138 CCI-000366 MEDIUM The HP FlexFabric Switch must employ automated mechanisms to assist in the tracking of security incidents. Despite the investment in perimeter defense technologies, enclaves are still faced with detecting, analyzing, and remediating network breaches and exploits that have made it past the HP FlexFabric Switch. An automated incident response infrastructure allo
    SV-80783r1_rule HFFS-ND-000139 CCI-000366 MEDIUM The HP FlexFabric Switch must obtain its public key certificates from an appropriate certificate policy through an approved service provider. For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Aut
    SV-80785r1_rule HFFS-ND-000140 CCI-000366 HIGH The HP FlexFabric Switch must have a local account that will only be used as an account of last resort with full access to the network device. In the event the network device loses connectivity to the management network authentication service, only a local account can gain access to the switch to perform configuration and maintenance. Without this capability, the network device is inaccessible t
    SV-80787r1_rule HFFS-ND-000141 CCI-000366 MEDIUM The HP FlexFabric switch must be configured to utilize an authentication server for the purpose of authenticating privilege users, managing accounts, and to centrally verify authentication settings and Personal Identity Verification (PIV) credentials. To assure accountability and prevent unauthenticated access, organizational administrators must be uniquely identified and authenticated for all network management accesses to prevent potential misuse and compromise of the system. Protecting access author
    SV-80789r1_rule HFFS-ND-000142 CCI-000366 MEDIUM The HP FlexFabric switch must be configured to send log data to a syslog server for the purpose of forwarding alerts to the administrators and the ISSO. Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply create a new account. Notification of account creation is
    SV-80791r1_rule HFFS-ND-000143 CCI-000366 MEDIUM The HP FlexFabric switch must be configured to send SNMP traps and notifications to the SNMP manager for the purpose of sending alarms and notifying appropriate personnel as required by specific events. If appropriate actions are not taken when a network device failure occurs, a denial of service condition may occur which could result in mission failure since the network would be operating without a critical security monitoring and prevention function. U