HYCU Protege Security Technical Implementation Guide

  • Version/Release: V1R1
  • Published: 2024-10-29
  • Released: 2024-10-22
  • Expand All:
  • Severity:
  • Sort:
Compare

Select any two versions of this STIG to compare the individual requirements

View

Select any old version/release of this STIG to view the previous requirements

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
b
The HYCU virtual appliance must be configured to synchronize internal information system clocks using redundant authoritative time sources.
- Medium - CCI-004922 - V-268216 - SV-268216r1038348_rule
RMF Control
Severity
Medium
CCI
CCI-004922
Version
HYCU-ND-000440
Vuln IDs
  • V-268216
Rule IDs
  • SV-268216r1038348_rule
The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other functions. Multiple time sources provide redundancy by including a secondary source. Time synchronization is usually a hierarchy; clients synchronize time to a local source while that source synchronizes its time to a more accurate source. The network device must use an authoritative time server and/or be configured to use redundant authoritative time sources. This requirement is related to the comparison done in CCI-001891. DOD-approved solutions consist of a combination of a primary and secondary time source using a combination or multiple instances of the following: a time server designated for the appropriate DOD network (NIPRNet/SIPRNet); United States Naval Observatory (USNO) time servers; and/or the Global Positioning System (GPS). The secondary time source must be located in a different geographic region than the primary time source. Satisfies: SRG-APP-000920-NDM-000320, SRG-APP-000925-NDM-000330
Checks: C-72237r1038346_chk

Verify the "chronyd" service is up and running, execute the following command: systemctl status chronyd If service is not active (running), this is a finding. To verify chronyd has synced time and can reach the servers execute the following command: chronyc sources If there are not two NTP servers listed, this is a finding. If the "Reach" value is lower than "377" for the source with S column marked with "*" this is a finding.

Fix: F-72140r1038347_fix

Start the time synchronization by logging on to the HYCU console and executing the following command: sudo systemctl restart chronyd Additional assistance can be found at: https://support.hycu.com/hc/en-us/articles/115005424345-HYCU-system-time

b
The HYCU virtual appliance must not have any default manufacturer passwords when deployed.
- Medium - CCI-004061 - V-268217 - SV-268217r1038727_rule
RMF Control
Severity
Medium
CCI
CCI-004061
Version
HYCU-ND-000600
Vuln IDs
  • V-268217
Rule IDs
  • SV-268217r1038727_rule
Virtual machines not protected with strong password schemes provide the opportunity for anyone to crack the password and gain access to the device, which can result in loss of availability, confidentiality, or integrity of network traffic. Many default vendor passwords are well known or are easily guessed; therefore, not removing them prior to deploying the network device into production provides an opportunity for a malicious user to gain unauthorized access to the device.
Checks: C-72238r1038725_chk

Log in to the HYCU VM console with the default vendor credentials. If the login to the console is successful with the default credentials, this is a finding. Log in to the HYCU Web UI with the default vendor credentials. If the login to the HYCU Web UI is successful with the default credentials, this is a finding.

Fix: F-72141r1038726_fix

Log in to the HYCU VM console with the default username and password. Run the passwd command to change the default password. Log in to the HYCU Web UI with the default password and change the password by selecting the "Admin" account in the upper-right corner and changing the password. This logs off the admin account and prompts the user to log in with the updated credentials.

b
The HYCU virtual appliance must limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.
AC-10 - Medium - CCI-000054 - V-268219 - SV-268219r1038638_rule
RMF Control
AC-10
Severity
Medium
CCI
CCI-000054
Version
HYCU-ND-000010
Vuln IDs
  • V-268219
Rule IDs
  • SV-268219r1038638_rule
Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administrator based on account type, role, or access type is helpful in limiting risks related to denial-of-service (DoS) attacks. This requirement addresses concurrent sessions for administrative accounts and does not address concurrent sessions by a single administrator via multiple administrative accounts. The maximum number of concurrent sessions should be defined based upon mission needs and the operational environment for each system. At a minimum, limits must be set for SSH, HTTPS, account of last resort, and root account sessions.
Checks: C-72240r1038637_chk

In the HYCU Web UI, only one login can be used at a time. If the user is still logged into the HYCU Web UI upon logging in to the Web UI again, in a different browser tab, with the same credentials, this is a finding. Log in to the HYCU VM console. To check the number of allowed concurrent session connections, grep file "/etc/security/limits.conf" by executing the following command: grep maxlogins /etc/security/limits.conf Verify the following line exists: hycu hard maxlogins 1 If the "maxlogins" value is not set to 1 or is missing, this is a finding.

Fix: F-72143r1038356_fix

The Web UI will only always allow one user session at a time. For CLI, configure the operating system to limit the max number of concurrent sessions to 1 by adding the following line to "/etc/security/limits.conf": hycu hard maxlogins 1

c
The HYCU virtual appliance must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
AC-3 - High - CCI-000213 - V-268222 - SV-268222r1038366_rule
RMF Control
AC-3
Severity
High
CCI
CCI-000213
Version
HYCU-ND-000040
Vuln IDs
  • V-268222
Rule IDs
  • SV-268222r1038366_rule
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD systems must be properly configured to incorporate access control methods that do not rely solely on the possession of a certificate for access. Successful authentication must not automatically give an entity access to an asset or security boundary. Authorization procedures and controls must be implemented to ensure each authenticated entity also has a validated and current authorization. Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset. Network devices use access control policies and enforcement mechanisms to implement this requirement.
Checks: C-72243r1038364_chk

Review the Self-Service menu within HYCU to view accounts and user roles (Administrator, Backup Operator, Restore Operator, Backup and Restore Operator, or Viewer). User roles have a predefined and nonchangeable set of user privileges. To check exact set of privileges of each user, navigate to Self-Service context in the HYCU UI. Click on the question mark in the upper-right corner, followed by "Help with This Page". Scroll down to the "User Roles" section. If users can perform more functions than those specified for their role, this is a finding.

Fix: F-72146r1038365_fix

Apply the appropriate user role to the required user from one of the predefined and nonchangeable roles: Administrator, Backup Operator, Restore Operator, Backup and Restore Operator, or Viewer.

b
If the HYCU virtual appliance uses role-based access control, it must enforce organization-defined role-based access control policies over defined subjects and objects.
AC-3 - Medium - CCI-002169 - V-268223 - SV-268223r1038369_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-002169
Version
HYCU-ND-000050
Vuln IDs
  • V-268223
Rule IDs
  • SV-268223r1038369_rule
Organizations can create specific roles based on job functions and the authorizations (i.e., privileges) to perform needed operations on organizational information systems associated with the organization-defined roles. When administrators are assigned to the organizational roles, they inherit the authorizations or privileges defined for those roles. Role-Based Access Control (RBAC) simplifies privilege administration for organizations because privileges are not assigned directly to every administrator (which can be a significant number of individuals for mid- to large-size organizations) but are instead acquired through role assignments. RBAC can be implemented either as a mandatory or discretionary form of access control. The RBAC policies and the subjects and objects are defined uniquely for each network device, so they cannot be specified in the requirement.
Checks: C-72244r1038367_chk

HYCU offers the capability to leverage RBAC controls within the Web UI's Self-Service menu. The organization would need to generate and document its own specific requirements around using RBAC in HYCU. For the HYCU VM console, administrators should only allow access to anyone else deemed to be qualified as a server administrator for the system. Review the groups and accounts within Web UI's Self-Service menu. If any RBAC setting does not meet the organization's guidelines, this is a finding.

Fix: F-72147r1038368_fix

Ensure the correct RBAC controls and access are applied properly within the HYCU Web UI's Self-Service menu. Avoid granting too much access to any particular user or group. For the HYCU VM console, administrators should only allow access to anyone else deemed to be qualified as a server administrator for the system. To check for any unauthorized users, run the following command within the HYCU Web console: cat /etc/passwd Use the "userdel" command to remove any unauthorized users.

b
The HYCU virtual appliance must enforce approved authorizations for controlling the flow of management information within the appliance based on information flow control policies.
AC-4 - Medium - CCI-001368 - V-268225 - SV-268225r1038375_rule
RMF Control
AC-4
Severity
Medium
CCI
CCI-001368
Version
HYCU-ND-000070
Vuln IDs
  • V-268225
Rule IDs
  • SV-268225r1038375_rule
A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design. If management information flow is not enforced based on approved authorizations, the network device may become compromised. Information flow control regulates where management information is allowed to travel within a network device. The flow of all management information must be monitored and controlled so it does not introduce any unacceptable risk to the network device or data. Satisfies: SRG-APP-000038-NDM-000213, SRG-APP-000880-NDM-000290
Checks: C-72246r1038373_chk

Verify the firewall is running by executing the following command: sudo firewall-cmd --state If service is not running, this is a finding. Determine which services and ports are open by executing the following command: sudo firewall-cmd --list-all Output should show the following two lines: 'services: cockpit dhcpv6-client iscsi-target samba ssh' 'ports: 8443/tcp' If more services than those listed above are open, this is a finding.

Fix: F-72149r1038374_fix

Enable the firewall by executing the following commands: sudo systemctl enable firewalld sudo systemctl start firewalld

b
The HYCU virtual appliance must audit the execution of privileged functions.
AC-6 - Medium - CCI-002234 - V-268226 - SV-268226r1038378_rule
RMF Control
AC-6
Severity
Medium
CCI
CCI-002234
Version
HYCU-ND-000080
Vuln IDs
  • V-268226
Rule IDs
  • SV-268226r1038378_rule
Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing the use of privileged functions is one way to detect such misuse and identify the risk from insider threats and the advanced persistent threat.
Checks: C-72247r1038376_chk

Check the contents of the "/var/log/audit/audit.log" file. HYCU also maintains Event (Audit) information in the HYCU Web UI Events menu. Verify the audit log contains records showing when the execution of privileged functions occurred. If the audit log is not configured or does not have the required contents, this is a finding.

Fix: F-72150r1038377_fix

Configure HYCU to audit the execution of the "execve" system call. Add or update the following file system rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv Reboot the appliance to take effect.

b
The HYCU virtual appliance must be configured to enforce the limit of three consecutive invalid login attempts, after which time it must block any login attempt for 15 minutes.
AC-7 - Medium - CCI-000044 - V-268227 - SV-268227r1038750_rule
RMF Control
AC-7
Severity
Medium
CCI
CCI-000044
Version
HYCU-ND-000090
Vuln IDs
  • V-268227
Rule IDs
  • SV-268227r1038750_rule
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
Checks: C-72248r1038639_chk

Log in to the HYCU VM console and go to the "/etc/pam.d/" folder. Verify that "password-auth" and "system-auth" contain the following three lines, and the values for deny and unlock_time are as shown. Commands: sudo grep pam_faillock.so /etc/pam.d/password-auth sudo grep pam_faillock.so /etc/pam.d/system-auth Both should displays the following three lines: auth required pam_faillock.so preauth silent audit deny=3 even_deny_root fail_interval=60 unlock_time=900 auth required pam_faillock.so authfail audit unlock_time=900 account required pam_faillock.so If the required content is not present, this is a finding.

Fix: F-72151r1038749_fix

Log in to the server virtual console and navigate to the "/etc/pam.d/" folder. Move the current configuration and make new copies to be edited by executing the following commands: sudo cp password-auth password-auth-as sudo cp system-auth system-auth-as Edit the files "password-auth" and "system-auth". Add the lines: auth required pam_faillock.so preauth silent audit deny=3 even_deny_root fail_interval=60 unlock_time=900 after line auth required pam_env.so Add: auth required pam_faillock.so authfail audit unlock_time=900 after auth sufficient pam_unix.so nullok Add: account required pam_faillock.so before account required pam_unix.so The files "system-auth" and "password-auth" are identical, so the procedure can be done on one of the files and copied to the second one. Restart sssd service: sudo systemctl restart sssd.service

b
The HYCU virtual appliance must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the device.
AC-8 - Medium - CCI-000048 - V-268228 - SV-268228r1038752_rule
RMF Control
AC-8
Severity
Medium
CCI
CCI-000048
Version
HYCU-ND-000100
Vuln IDs
  • V-268228
Rule IDs
  • SV-268228r1038752_rule
Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
Checks: C-72249r1038641_chk

Log in to the HYCU VM console and verify the banner setting is in use in the "/etc/ssh/sshd_config" file by executing the following command: grep Banner /etc/ssh/sshd_config If the banner is not set to "/etc/issue", this is a finding. Verify "/etc/issue" contains valid DOD notice text by executing the following command: sudo cat /etc/issue If the DOD notice is not present in the "/etc/issue" file, this is a finding. Open the HYCU Web UI login page and verify the mandatory notice is present on the welcome page. If the mandatory notice is not present at the HYCU Web UI welcome page, this is a finding.

Fix: F-72152r1038751_fix

The GUI login page welcome message and look of the console/ssh login can be changed by following the procedure below: 1. Open a remote session to the HYCU backup controller: ssh hycu@<HYCUBackupControllerIPAddress> 2. Create the /hycudata/var/branding folder by executing: sudo mkdir -p /hycudata/var/branding 3. Make the following files available in /hycudata/var/branding: loginImage.PNG/ JPG - Login screen background (1574?×?1920) console.txt - Pre-login banner for text-based console sshd.txt - Pre-login banner for SSH access 3. Update the branding configuration by running the following command: sudo /opt/grizzly/bin/hycu-branding.sh 4. Perform a hard reload of the HYCU Web UI page in the web browser.

b
The HYCU virtual appliance must retain the Standard Mandatory DOD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log in for further access.
AC-8 - Medium - CCI-000050 - V-268229 - SV-268229r1038748_rule
RMF Control
AC-8
Severity
Medium
CCI
CCI-000050
Version
HYCU-ND-000110
Vuln IDs
  • V-268229
Rule IDs
  • SV-268229r1038748_rule
The banner must be acknowledged by the administrator prior to the device allowing the administrator access to the network device. This provides assurance that the administrator has seen the message and accepted the conditions for access. If the consent banner is not acknowledged by the administrator, DOD will not comply with system use notifications required by law.
Checks: C-72250r1038644_chk

Log in to the HYCU VM console and verify the banner setting is in use in the "/etc/ssh/sshd_config" file by executing the following command: grep Banner /etc/ssh/sshd_config If the banner is not set to "/etc/issue", this is a finding. Verify "/etc/issue" contains valid DOD notice text by executing the following command: sudo cat /etc/issue If DOD Notice is not present in the "/etc/issue" file, this is a finding. Open the HYCU Web UI login page and verify the mandatory notice is present on the Welcome page. If the mandatory notice is not present at HYCU Web UI Welcome page, this is a finding.

Fix: F-72153r1038748_fix

Change the GUI login page welcome message and look of the console/ssh login by following the procedure below: 1. Open a remote session to the HYCU backup controller: ssh hycu@<HYCUBackupControllerIPAddress> 2. Create the /hycudata/var/branding folder by executing: sudo mkdir -p /hycudata/var/branding 3. Make the following files available in /hycudata/var/branding: loginImage.PNG/ JPG - Login screen background (1920 x 1440) console.txt - Pre-login banner for text-based console sshd.txt - Pre-login banner for SSH access 4. Update the branding configuration by running the following command: sudo /opt/grizzly/bin/hycu-branding.sh 5. Perform a hard reload of the HYCU Web UI page in the web browser.

b
The HYCU virtual appliance must automatically audit account creation.
AC-2 - Medium - CCI-000018 - V-268231 - SV-268231r1038648_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-000018
Version
HYCU-ND-000130
Vuln IDs
  • V-268231
Rule IDs
  • SV-268231r1038648_rule
Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. Notification of account creation helps to mitigate this risk. Auditing account creation provides the necessary reconciliation that account management procedures are being followed. Without this audit trail, personnel without the proper authorization may gain access to critical network nodes.
Checks: C-72252r1038391_chk

Verify the operating system must generate audit records for all account creations events. Check the auditing rules in "/etc/audit/audit.rules" with the following command: # grep -E "/etc/passwd|/etc/gshadow|/etc/shadow|/etc/security/opasswd|/etc/group|/etc/sudoers|/etc/sudoers.d/" /etc/audit/audit.rules -w /etc/passwd -p wa -k identity -w /etc/gshadow -p wa -k identity -w /etc/shadow -p wa -k identity -w /etc/security/opasswd -p wa -k identity -w /etc/group -p wa -k identity -w /etc/sudoers -p wa -k identity -w /etc/sudoers.d/ -p wa -k identity If the command does not return all the lines above, or one or more of the lines are commented out, this is a finding.

Fix: F-72155r1038647_fix

Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load

b
The HYCU virtual appliance must automatically audit account modification.
AC-2 - Medium - CCI-001403 - V-268232 - SV-268232r1038650_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-001403
Version
HYCU-ND-000140
Vuln IDs
  • V-268232
Rule IDs
  • SV-268232r1038650_rule
Since the accounts in the network device are privileged or system-level accounts, account management is vital to the security of the network device. Account management by a designated authority ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel with the appropriate and necessary privileges. Auditing account modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed. If modifications to management accounts are not audited, reconciliation of account management procedures cannot be tracked.
Checks: C-72253r1038394_chk

Verify the operating system must generate audit records for all account modification events. Check the auditing rules in "/etc/audit/audit.rules" with the following command: # grep -E "/etc/passwd|/etc/gshadow|/etc/shadow|/etc/security/opasswd|/etc/group|/etc/sudoers|/etc/sudoers.d/" /etc/audit/audit.rules -w /etc/passwd -p wa -k identity -w /etc/gshadow -p wa -k identity -w /etc/shadow -p wa -k identity -w /etc/security/opasswd -p wa -k identity -w /etc/group -p wa -k identity -w /etc/sudoers -p wa -k identity -w /etc/sudoers.d/ -p wa -k identity If the command does not return all the lines above, or one or more of the lines are commented out, this is a finding.

Fix: F-72156r1038649_fix

Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load

b
The HYCU virtual appliance must automatically audit account disabling actions.
AC-2 - Medium - CCI-001404 - V-268233 - SV-268233r1038652_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-001404
Version
HYCU-ND-000150
Vuln IDs
  • V-268233
Rule IDs
  • SV-268233r1038652_rule
Account management ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account disabling actions will support account management procedures. When device management accounts are disabled, user or service accessibility may be affected. Auditing also ensures authorized active accounts remain enabled and available for use when required.
Checks: C-72254r1038397_chk

Verify the operating system must generate audit records for all account disabling events. Check the auditing rules in "/etc/audit/audit.rules" with the following command: # grep -E "/etc/passwd|/etc/gshadow|/etc/shadow|/etc/security/opasswd|/etc/group|/etc/sudoers|/etc/sudoers.d/" /etc/audit/audit.rules -w /etc/passwd -p wa -k identity -w /etc/gshadow -p wa -k identity -w /etc/shadow -p wa -k identity -w /etc/security/opasswd -p wa -k identity -w /etc/group -p wa -k identity -w /etc/sudoers -p wa -k identity -w /etc/sudoers.d/ -p wa -k identity If the command does not return all the lines above, or one or more of the lines are commented out, this is a finding.

Fix: F-72157r1038651_fix

Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load

b
The HYCU virtual appliance must automatically audit account removal actions.
AC-2 - Medium - CCI-001405 - V-268234 - SV-268234r1038654_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-001405
Version
HYCU-ND-000160
Vuln IDs
  • V-268234
Rule IDs
  • SV-268234r1038654_rule
Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account removal actions will support account management procedures. When device management accounts are terminated, user or service accessibility may be affected. Auditing also ensures authorized active accounts remain enabled and available for use when required.
Checks: C-72255r1038400_chk

Verify the operating system generates audit records for all account removal events. Check the auditing rules in "/etc/audit/audit.rules" with the following command: # grep -E "/etc/passwd|/etc/gshadow|/etc/shadow|/etc/security/opasswd|/etc/group|/etc/sudoers|/etc/sudoers.d/" /etc/audit/audit.rules -w /etc/passwd -p wa -k identity -w /etc/gshadow -p wa -k identity -w /etc/shadow -p wa -k identity -w /etc/security/opasswd -p wa -k identity -w /etc/group -p wa -k identity -w /etc/sudoers -p wa -k identity -w /etc/sudoers.d/ -p wa -k identity If the command does not return all the lines above, or one or more of the lines are commented out, this is a finding.

Fix: F-72158r1038653_fix

Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load

c
The HYCU virtual appliance must be configured to use DOD-approved online certificate status protocol (OCSP) responders or certificate revocation lists (CRLs) to validate certificates used for PKI-based authentication.
IA-5 - High - CCI-000185 - V-268235 - SV-268235r1038742_rule
RMF Control
IA-5
Severity
High
CCI
CCI-000185
Version
HYCU-ND-000180
Vuln IDs
  • V-268235
Rule IDs
  • SV-268235r1038742_rule
Once issued by a DOD certificate authority (CA), public key infrastructure (PKI) certificates are typically valid for three years or shorter within the DOD. However, there are many reasons a certificate may become invalid before the prescribed expiration date. For example, an employee may leave or be terminated and still possess the smartcard on which the PKI certificates were stored. Another example is that a smartcard containing PKI certificates may become lost or stolen. A more serious issue could be that the CA or server which issued the PKI certificates has become compromised, thereby jeopardizing every certificate keypair that was issued by the CA. These examples of revocation use cases and many more can be researched further using internet cybersecurity resources. PKI user certificates presented as part of the identification and authentication criteria (e.g., DOD PKI as multifactor authentication [MFA]) must be checked for validity by network devices. For example, valid PKI certificates are digitally signed by a trusted DOD CA. Additionally, valid PKI certificates are not expired, and valid certificates have not been revoked by a DOD CA. Network devices can verify the validity of PKI certificates by checking with an authoritative CA. One method of checking the status of PKI certificates is to query databases referred to as certificate revocation lists (CRL). These are lists which are published, updated, and maintained by authoritative DOD CAs. For example, once certificates are expired or revoked, issuing CAs place the certificates on a CRL. Organizations can download these lists periodically (i.e., daily or weekly) and store them locally on the devices themselves or even onto another nearby local enclave resource. Storing them locally ensures revocation status can be checked even if internet connectivity is severed at the enclave's point of presence (PoP). However, CRLs can be rather large in storage size and further, the use of CRLs can be rather taxing on some computing resources. Another method of validating certificate status is to use the OCSP. Using OCSP, a requestor (i.e., the network device which the user is trying to authenticate to) sends a request to an authoritative CA challenging the validity of a certificate that has been presented for identification and authentication. The CA receives the request and sends a digitally signed response indicating the status of the user's certificate as valid, revoked, or unknown. Network devices should only allow access for responses that indicate the certificates presented by the user were considered valid by an approved DOD CA. OCSP is the preferred method because it is fast, provides the most current status, and is lightweight. Satisfies: SRG-APP-000175-NDM-000262, SRG-APP-000177-NDM-000263, SRG-APP-000080-NDM-000220
Checks: C-72256r1038655_chk

Log in to the HYCU console and execute the following command: sudo cat /opt/grizzly/config.properties | grep cert.path.revocation.checking.enabled=true If the variable is not set to true, this is a finding.

Fix: F-72159r1038404_fix

OCSP revocation applies to all SSL communication done from HYCU Java application, including SMTP in SSL mode, LDAPS, and any HTTPS interaction (platform API servers, cloud targets, webhooks, etc.). To enable OCSP revocation, log in to the HYCU console and edit the config file by executing the following command: sudo vi /opt/grizzly/config.properties and add the following line: cert.path.revocation.checking.enabled=true

c
The HYCU virtual appliance must be configured to use at least two authentication servers for authenticating users prior to granting administration access.
CM-6 - High - CCI-000370 - V-268236 - SV-268236r1038659_rule
RMF Control
CM-6
Severity
High
CCI
CCI-000370
Version
HYCU-ND-000190
Vuln IDs
  • V-268236
Rule IDs
  • SV-268236r1038659_rule
Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With robust centralized management, audit records for administrator account access to the organization's network devices can be more readily analyzed for trends and anomalies. The alternative method of defining administrator accounts on each device exposes the device configuration to remote access authentication attacks and system administrators with multiple authenticators for each network device.
Checks: C-72257r1038657_chk

Log in to the HYCU Web UI, select the gear menu, and then choose the Identity Providers option. Verify that two authentication servers are configured. If no authentication server is configured or only a single server is configured, this is a finding.

Fix: F-72160r1038658_fix

Log in to the HYCU Web UI, select the gear menu, and then choose the Identity Providers option. Click "New" to add an authentication server. Configure two authentication servers on the Web UI.

c
The HYCU virtual appliance must be configured to use DOD PKI as multifactor authentication (MFA) for interactive logins.
IA-2 - High - CCI-000765 - V-268237 - SV-268237r1038754_rule
RMF Control
IA-2
Severity
High
CCI
CCI-000765
Version
HYCU-ND-000210
Vuln IDs
  • V-268237
Rule IDs
  • SV-268237r1038754_rule
MFA is when two or more factors are used to confirm the identity of an individual who is requesting access to digital information resources. Valid factors include something the individual knows (e.g., username and password), something the individual has (e.g., a smartcard or token), or something the individual is (e.g., a fingerprint or biometric). Legacy information system environments only use a single factor for authentication, typically a username and password combination. Although two pieces of data are used in a username and password combination, this is still considered single factor because an attacker can obtain access simply by learning what the user knows. Common attacks against single-factor authentication are attacks on user passwords. These attacks include brute force password guessing, password spraying, and password credential stuffing. MFA, along with strong user account hygiene, helps mitigate against the threat of having account passwords discovered by an attacker. Even in the event of a password compromise, with MFA implemented and required for interactive login, the attacker still needs to acquire something the user has or replicate a piece of user's biometric digital presence. Private industry recognizes and uses a wide variety of MFA solutions. However, DOD public key infrastructure (PKI) is the only prescribed method approved for DOD organizations to implement MFA. For authentication purposes, centralized DOD certificate authorities (CA) issue PKI certificate key pairs (public and private) to individuals using the prescribed x.509 format. The private certificates that have been generated by the issuing CA are downloaded and saved to smartcards which, within DOD, are referred to as common access cards (CAC) or personal identity verification (PIV) cards. This happens at designated DOD badge facilities. The CA maintains a record of the corresponding public keys for use with PKI-enabled environments. Privileged user smartcards, or "alternate tokens", function in the same manner, so this requirement applies to all interactive user sessions (authorized and privileged users). Note: This requirement is used in conjunction with the use of a centralized authentication server (e.g., AAA, RADIUS, LDAP), which is a separate but equally important requirement. The MFA configuration of this requirement provides identification and the first phase of authentication (the challenge and validated response, thereby confirming the PKI certificate that was presented by the user). The centralized authentication server will provide the second phase of authentication (the digital presence of the PKI ID as a valid user in the requested security domain) and authorization. The centralized authentication server will map validated PKI identities to valid user accounts and determine access levels for authenticated users based on security group membership and role. In cases where the centralized authentication server is not used by the network device for user authorization, the network device must map the authenticated identity to the user account for PKI-based authentication. Satisfies: SRG-APP-000149-NDM-000247, SRG-APP-000820-NDM-000170, SRG-APP-000825-NDM-000180
Checks: C-72258r1038660_chk

Log in to the HYCU Web UI, select the gear menu, and then choose the Identity Providers option. Verify that at least one Identity Provider authentication server is configured. If no Identity Provider is configured, this is a finding. When using certificate authentication using client certificate or smart card (CAC authentication), verify "Enable Certificate Authentication" is enabled. If "Enable Certification Authentication" is not enabled, this is a finding.

Fix: F-72161r1038753_fix

Configure Identity Provider authentication by adding one or more Identity Providers as authentication sources in HYCU. This allows users to log in to the HYCU web user interface with their Identity Provider accounts or, if certificate authentication is enabled, with a client certificate or a smart card (CAC authentication). Log in to the HYCU Web UI, select the gear menu, and choose the "Identity Providers" option. Configure Identity Provider by specifying the required setting. For example, if configuring Active Directory IDP, provide the domain and required LDAP URL to allow HYCU to use AD users and groups for access to the Web UI. When using certificate authentication using client certificate or smart card (CAC authentication), ensure "Service Account" is specified in the Active Directory configuration and "Enable Certificate Authentication" is enabled.

b
The HYCU virtual appliance must generate audit records when successful/unsuccessful attempts to access privileges occur.
AU-12 - Medium - CCI-000172 - V-268238 - SV-268238r1038665_rule
RMF Control
AU-12
Severity
Medium
CCI
CCI-000172
Version
HYCU-ND-000220
Vuln IDs
  • V-268238
Rule IDs
  • SV-268238r1038665_rule
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).
Checks: C-72259r1038663_chk

HYCU Web UI user access accounts cannot be edited, only removed and readded from/to user groups in the Web UI Self-Service menu. After adding a user to a group, log in to the HYCU Web UI, navigate into Events context, and search for message of category "USER_GROUP" and text "Successfully added user to group". If the message is not in Events, this is a finding. Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not in a running state, this is a finding. Check the contents of the "/var/log/audit/audit.log" file. Verify the operating system generates audit records when successful/unsuccessful attempts to access privileges occur. If the audit log is not configured or does not have required contents, this is a finding.

Fix: F-72162r1038664_fix

Configure the operating system to generate audit records when successful/unsuccessful attempts to access privileges occur. Log in to the HYCU VM console and run the following command: chkconfig auditd on Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. sudo cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. sudo augenrules --load

b
The HYCU virtual appliance must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
AU-12 - Medium - CCI-000172 - V-268239 - SV-268239r1038771_rule
RMF Control
AU-12
Severity
Medium
CCI
CCI-000172
Version
HYCU-ND-000230
Vuln IDs
  • V-268239
Rule IDs
  • SV-268239r1038771_rule
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., module or policy filter).
Checks: C-72260r1038415_chk

Check the contents of the "/var/log/audit/audit.log" file. HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu. Verify the audit log contains records showing successful/unsuccessful attempts to modify or delete administrator privileges. If the audit log is not configured or does not have required contents, this is a finding.

Fix: F-72163r1038666_fix

Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load

b
The HYCU virtual appliance must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
AU-12 - Medium - CCI-000172 - V-268240 - SV-268240r1038772_rule
RMF Control
AU-12
Severity
Medium
CCI
CCI-000172
Version
HYCU-ND-000240
Vuln IDs
  • V-268240
Rule IDs
  • SV-268240r1038772_rule
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., module or policy filter).
Checks: C-72261r1038418_chk

Check the contents of the "/var/log/audit/audit.log" file. HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu. Verify the audit log contains records showing successful/unsuccessful attempts to modify or delete administrator privileges. If the audit log is not configured or does not have required contents, this is a finding.

Fix: F-72164r1038668_fix

Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load

b
The HYCU virtual appliance must generate audit records when successful/unsuccessful login attempts occur.
AU-12 - Medium - CCI-000172 - V-268241 - SV-268241r1038672_rule
RMF Control
AU-12
Severity
Medium
CCI
CCI-000172
Version
HYCU-ND-000250
Vuln IDs
  • V-268241
Rule IDs
  • SV-268241r1038672_rule
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., module or policy filter).
Checks: C-72262r1038670_chk

Check the contents of the "/var/log/audit/audit.log" file. Verify the audit log contains records showing when successful/unsuccessful login attempts occur. If the audit log is not configured or does not have required contents, this is a finding. HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu. Log in with correct and incorrect credentials and check the HYCU Events. If the HYCU events of category "SECURITY" are not logged for each of the attempts, status is not "Success" for the correct credentials and status is not "Warning" for the incorrect credentials, this is a finding.

Fix: F-72165r1038671_fix

Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load

b
The HYCU virtual appliance must generate audit records for privileged activities or other system-level access.
AU-12 - Medium - CCI-000172 - V-268242 - SV-268242r1038675_rule
RMF Control
AU-12
Severity
Medium
CCI
CCI-000172
Version
HYCU-ND-000260
Vuln IDs
  • V-268242
Rule IDs
  • SV-268242r1038675_rule
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., module or policy filter).
Checks: C-72263r1038673_chk

Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not in a running state, this is a finding. Also, if no logs are present in the "/var/log/secure" file, this is a finding.

Fix: F-72166r1038674_fix

Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following command: chkconfig auditd on Use the following command to review the logs: cat /var/log/secure | less Use the "/" character to search the log or timeframe for any undesired/unapproved changes.

b
The HYCU virtual appliance must generate log records for a locally developed list of auditable events.
AU-12 - Medium - CCI-000169 - V-268244 - SV-268244r1038775_rule
RMF Control
AU-12
Severity
Medium
CCI
CCI-000169
Version
HYCU-ND-000280
Vuln IDs
  • V-268244
Rule IDs
  • SV-268244r1038775_rule
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., module or policy filter).
Checks: C-72265r1038773_chk

Log in to the HYCU VM console. Review the /etc/audit/auditd.conf file and verify the settings are in accordance with a locally developed list of auditable events. If it is not configured in accordance with organizational policies, this is a finding. Check for the value of the "max_log_file_action" option in "/etc/audit/auditd.conf" with the following command: sudo grep max_log_file_action /etc/audit/auditd.conf If the "max_log_file_action" value is not set to "ROTATION", this is a finding.

Fix: F-72168r1038774_fix

Configure the operating system to use a locally developed list of auditable events by editing "/etc/audit/auditd.conf" files using the following command: sudo vi /etc/audit/auditd.conf Add or modify lines to have the required values for the organization.

b
The HYCU virtual appliance must produce audit records containing information to establish when events occurred, where events occurred, the source of the event, the outcome of the event, and identity of any individual or process associated with the event.
AU-3 - Medium - CCI-000131 - V-268245 - SV-268245r1038756_rule
RMF Control
AU-3
Severity
Medium
CCI
CCI-000131
Version
HYCU-ND-000290
Vuln IDs
  • V-268245
Rule IDs
  • SV-268245r1038756_rule
It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done to compile an accurate risk assessment. Logging the date and time of each detected event provides a means of investigating an attack; recognizing resource usage or capacity thresholds; or identifying an improperly configured network device. To establish and correlate the series of events leading up to an outage or attack, it is imperative the date and time are recorded in all log records. To compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as device hardware components, device software modules, session identifiers, filenames, host names, and functionality. To compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know the source of the event. The source may be a component, module, or process within the device or an external session, administrator, or device. Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the system. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the device after the event occurred). As such, they also provide a means to measure the impact of an event and help authorized personnel to determine the appropriate response. Satisfies: SRG-APP-000096-NDM-000226, SRG-APP-000097-NDM-000227, SRG-APP-000098-NDM-000228, SRG-APP-000099-NDM-000229, SRG-APP-000100-NDM-000230
Checks: C-72266r1038755_chk

Check the contents of the "/var/log/audit/audit.log" file. HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu. Verify the audit log contains records for: - When (date and time) events occurred. - Where events occurred. - The source of the event(s). - The outcome of the event(s). - The identity of any individual or process associated with the event(s). If the audit log is not configured or does not have required contents, this is a finding.

Fix: F-72169r1038680_fix

Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load

b
The HYCU virtual appliance must generate audit records containing the full-text recording of privileged commands.
AU-3 - Medium - CCI-000135 - V-268246 - SV-268246r1038438_rule
RMF Control
AU-3
Severity
Medium
CCI
CCI-000135
Version
HYCU-ND-000340
Vuln IDs
  • V-268246
Rule IDs
  • SV-268246r1038438_rule
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requirements. The additional information required is dependent on the type of information (i.e., sensitivity of the data and the environment within which it resides). At a minimum, the organization must audit full-text recording of privileged commands. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise.
Checks: C-72267r1038436_chk

Check if HYCU is configured to audit the execution of the "execve" system call, by running the following command: $ sudo grep execve /etc/audit/audit.rules -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv If the command does not return all lines, or the lines are commented out, this is a finding.

Fix: F-72170r1038437_fix

Configure HYCU to audit the execution of the "execve" system call. Add or update the following file system rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv Reboot the appliance to take effect.

b
The HYCU virtual appliance must produce audit log records containing sufficient information to establish what type of event occurred.
AU-3 - Medium - CCI-000130 - V-268247 - SV-268247r1038776_rule
RMF Control
AU-3
Severity
Medium
CCI
CCI-000130
Version
HYCU-ND-000350
Vuln IDs
  • V-268247
Rule IDs
  • SV-268247r1038776_rule
It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done to compile an accurate risk assessment. Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource usage or capacity thresholds; or identifying an improperly configured network device. Without this capability, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack.
Checks: C-72268r1038682_chk

Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not in a running state, this is a finding. Check the contents of the "/var/log/audit/audit.log" file. If the audit log does not have the required contents, this is a finding.

Fix: F-72171r1038683_fix

Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following command: chkconfig auditd on Use the following command to review the logs: cat /var/log/secure | less Use the "/" character to search the log or timeframe for any undesired/unapproved changes. Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. sudo cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. sudo augenrules --load

b
The HYCU virtual appliance must initiate session auditing upon startup.
AU-14 - Medium - CCI-001464 - V-268248 - SV-268248r1038777_rule
RMF Control
AU-14
Severity
Medium
CCI
CCI-001464
Version
HYCU-ND-000360
Vuln IDs
  • V-268248
Rule IDs
  • SV-268248r1038777_rule
It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done to compile an accurate risk assessment. Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource usage or capacity thresholds; or identifying an improperly configured network device. Without this capability, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enabled before a given process is created.
Checks: C-72269r1038685_chk

Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not in a running state, this is a finding. Check the contents of the "/var/log/audit/audit.log" file. If the audit log does not have the required contents, this is a finding.

Fix: F-72172r1038686_fix

Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following command: chkconfig auditd on Use the following command to review the logs: cat /var/log/secure | less Use the "/" character to search the log or timeframe for any undesired/unapproved changes. Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. sudo cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. sudo augenrules --load

b
The HYCU virtual appliance must automatically audit account enabling actions.
AC-2 - Medium - CCI-002130 - V-268249 - SV-268249r1038778_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-002130
Version
HYCU-ND-000370
Vuln IDs
  • V-268249
Rule IDs
  • SV-268249r1038778_rule
It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done to compile an accurate risk assessment. Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource usage or capacity thresholds; or identifying an improperly configured network device. Without this capability, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enabled before a given process is created.
Checks: C-72270r1038688_chk

Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not in a running state, this is a finding. Check the contents of the "/var/log/audit/audit.log" file. If the audit log does not have the required contents, this is a finding.

Fix: F-72173r1038689_fix

Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following command: chkconfig auditd on Use the following command to review the logs: cat /var/log/secure | less Use the "/" character to search the log or timeframe for any undesired/unapproved changes. Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. sudo cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. sudo augenrules --load

b
The HYCU virtual appliance must generate audit records showing starting and ending time for administrator access to the system.
AU-12 - Medium - CCI-000172 - V-268250 - SV-268250r1038779_rule
RMF Control
AU-12
Severity
Medium
CCI
CCI-000172
Version
HYCU-ND-000380
Vuln IDs
  • V-268250
Rule IDs
  • SV-268250r1038779_rule
It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done to compile an accurate risk assessment. Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource usage or capacity thresholds; or identifying an improperly configured network device. Without this capability, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enabled before a given process is created.
Checks: C-72271r1038691_chk

Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not enabled, this is a finding. Check the contents of the "/var/log/audit/audit.log" file. If the audit log does not have the required contents, this is a finding.

Fix: F-72174r1038692_fix

Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following commands: chkconfig auditd on systemctl start auditd Use the following command to review the logs: cat /var/log/secure | less Use the "/" character to search the log or timeframe for any undesired/unapproved changes. Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. sudo cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. sudo augenrules --load

b
The HYCU virtual appliance must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
AU-4 - Medium - CCI-001849 - V-268251 - SV-268251r1038695_rule
RMF Control
AU-4
Severity
Medium
CCI
CCI-001849
Version
HYCU-ND-000390
Vuln IDs
  • V-268251
Rule IDs
  • SV-268251r1038695_rule
To ensure network devices have a sufficient storage capacity in which to write the audit logs, they must be able to allocate audit record storage capacity. The task of allocating audit record storage capacity is usually performed during initial device setup if it can be modified.
Checks: C-72272r1038694_chk

Log in to the HYCU VM console. Review the /etc/audit/auditd.conf file and verify that the settings are in accordance with organizational policies. If it is not configured in accordance with organizational policies, this is a finding. Check for the value of the "max_log_file_action" option in "/etc/audit/auditd.conf" with the following command: sudo grep max_log_file_action /etc/audit/auditd.conf If the "max_log_file_action" value is not set to "ROTATION", this is a finding.

Fix: F-72175r1038452_fix

Configure the operating system to enforce log rotation and restrict log file size to an organization-defined value by editing "/etc/audit/auditd.conf" files using the following command: sudo vi /etc/audit/auditd.conf Add or modify the following lines to have the required value for the organization. Refer to the sample below: max_log_file_action = ROTATION max_log_file = 6

b
The HYCU virtual appliance must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
CP-9 - Medium - CCI-000539 - V-268252 - SV-268252r1038698_rule
RMF Control
CP-9
Severity
Medium
CCI
CCI-000539
Version
HYCU-ND-000400
Vuln IDs
  • V-268252
Rule IDs
  • SV-268252r1038698_rule
Information system backup is a critical step in maintaining data assurance and availability. Information system and security-related documentation contains information pertaining to system configuration and security settings. If this information were not backed up, and a system failure were to occur, the security settings would be difficult to reconfigure quickly and accurately. Maintaining a backup of information system and security-related documentation provides for a quicker recovery time when system outages occur. System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execution and operation of the device. Information system backup is a critical step in ensuring system integrity and availability. If the system fails and there is no backup of the system-level information, a denial-of-service condition is possible for all who use this critical network component. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.
Checks: C-72273r1038696_chk

Verify that HYCU is backing itself up by logging in to the HYCU Web UI and checking the HYCU Controller widget at the HYCU Dashboard. If the message "Controller VM is not protected" is found and highlighted in orange, this is a finding.

Fix: F-72176r1038697_fix

Log in to the HYCU Web UI and go to the "Virtual Machines" menu, then apply a backup policy to the HYCU Server to back it up. Any documentation/configuration files stored on the HYCU server will be backed up as a result.

b
The HYCU virtual appliance must off-load audit records onto a different system or media than the system being audited.
AU-4 - Medium - CCI-001851 - V-268253 - SV-268253r1038701_rule
RMF Control
AU-4
Severity
Medium
CCI
CCI-001851
Version
HYCU-ND-000410
Vuln IDs
  • V-268253
Rule IDs
  • SV-268253r1038701_rule
Information system backup is a critical step in maintaining data assurance and availability. Information system and security-related documentation contains information pertaining to system configuration and security settings. If this information were not backed up and a system failure were to occur, the security settings would be difficult to reconfigure quickly and accurately. Maintaining a backup of information system and security-related documentation provides for a quicker recovery time when system outages occur. System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execution and operation of the device. Information system backup is a critical step in ensuring system integrity and availability. If the system fails and there is no backup of the system-level information, a denial-of-service condition is possible for all who use this critical network component. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity. Satisfies: SRG-APP-000515-NDM-000325, SRG-APP-000516-NDM-000340
Checks: C-72274r1038699_chk

Verify that HYCU is backing itself up by logging in to the HYCU Web UI and checking the HYCU Controller widget at the HYCU Dashboard. If the message "Controller VM is not protected" is found and highlighted in orange, this is a finding.

Fix: F-72177r1038700_fix

Log in to the HYCU Web UI and go to the "Virtual Machines" menu, then apply a backup policy to the HYCU Server to back it up. Any documentation/configuration files stored on the HYCU server will be backed up as a result.

b
The HYCU virtual appliance must generate an immediate real-time alert of all audit failure events requiring real-time alerts.
AU-5 - Medium - CCI-001858 - V-268254 - SV-268254r1038704_rule
RMF Control
AU-5
Severity
Medium
CCI
CCI-001858
Version
HYCU-ND-000430
Vuln IDs
  • V-268254
Rule IDs
  • SV-268254r1038704_rule
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impending failure of the audit capability and system operation may be adversely affected. Satisfies: SRG-APP-000360-NDM-000295, SRG-APP-000795-NDM-000130
Checks: C-72275r1038702_chk

Log in to the HYCU Web UI and review the "Events" menu and "Email Notifications" to verify that all appropriate/relevant audit failure events are included in the "Category" drop-down menu. If these events are not shown (reference a recent event capturing a login to HYCU for validation), this is a finding.

Fix: F-72178r1038703_fix

Log in to the HYCU Web UI and go to the "Events" menu and open "Email Notifications". Ensure that all the appropriate/relevant categories are selected and that the "Status" includes failures. Add a "Subject" for the "Email Notifications" and email address for necessary auditors or HYCU administrators.

b
The HYCU virtual appliance must protect audit information from unauthorized deletion.
AU-9 - Medium - CCI-000164 - V-268255 - SV-268255r1039643_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-000164
Version
HYCU-ND-000450
Vuln IDs
  • V-268255
Rule IDs
  • SV-268255r1039643_rule
Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit data, the network device must protect audit information from unauthorized deletion. This requirement can be achieved through multiple methods, which will depend upon system architecture and design. Some commonly employed methods include ensuring log files receive the proper file system permissions using file system protections, restricting access, and backing up log data to ensure log data is retained. Network devices providing a user interface to audit data will leverage user permissions and roles identifying the user accessing the data and the corresponding rights the user enjoys to make access decisions regarding the deletion of audit data.
Checks: C-72276r1038705_chk

Verify the operating system audit records have proper permissions and ownership. Log in to the HYCU console and list the full permissions and ownership of the audit log files with the following command: # sudo ls -la /var/log/audit total 4512 drwx------. 2 root root 23 Apr 25 16:53 . drwxr-xr-x. 17 root root 4096 Aug 9 13:09 .. -rw-------. 1 root root 8675309 Aug 9 12:54 audit.log Audit logs must be mode 0600 or less permissive. If any are more permissive, this is a finding. The owner and group owner of all audit log files must both be "root". If any other owner or group owner is listed, this is a finding.

Fix: F-72179r1038464_fix

Change the mode of the audit log files with the following command: # chmod 0600 [audit_file] Change the owner and group owner of the audit log files with the following command: # chown root:root [audit_file]

b
The HYCU virtual appliance must protect audit tools from unauthorized access, modification, and deletion.
AU-9 - Medium - CCI-001493 - V-268256 - SV-268256r1038708_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-001493
Version
HYCU-ND-000460
Vuln IDs
  • V-268256
Rule IDs
  • SV-268256r1038708_rule
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit data. Network devices providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys to make access decisions regarding the access to audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators. Satisfies: SRG-APP-000121-NDM-000238, SRG-APP-000122-NDM-000239, SRG-APP-000123-NDM-000240
Checks: C-72277r1038707_chk

Verify the operating system audit tools and config files have proper permissions and ownership. Log in to the HYCU console and list the full permissions and ownership of the audit folder with the following command: sudo ls -al /etc/audit Folder and files must be owned by root and the following permissions must be set: drwxr-x---. 4 root root 126 Mar 15 10:16 . drwxr-xr-x. 106 root root 8192 May 6 13:58 .. -rw-r-----. 1 root root 751 Apr 24 2020 audisp-remote.conf -rw-r-----. 1 root root 856 Apr 24 2020 auditd.conf -rw-r-----. 1 root root 107 Feb 3 13:18 audit.rules -rw-r-----. 1 root root 127 Apr 24 2020 audit-stop.rules drwxr-x---. 2 root root 67 Mar 15 10:16 plugins.d drwxr-x---. 2 root root 25 Feb 3 13:13 rules.d Audit files must be mode 0640 or less permissive. If any are more permissive, this is a finding. The owner and group owner of all audit files must both be "root". If any other owner or group owner is listed, this is a finding.

Fix: F-72180r1038467_fix

Change the mode of the audit log files with the following command: # chmod 0640 [audit_file] Change the owner and group owner of the audit files with the following command: # chown root:root [audit_file]

c
The HYCU virtual appliance must be running a release that is currently supported by the vendor.
CM-6 - High - CCI-000366 - V-268257 - SV-268257r1038710_rule
RMF Control
CM-6
Severity
High
CCI
CCI-000366
Version
HYCU-ND-000490
Vuln IDs
  • V-268257
Rule IDs
  • SV-268257r1038710_rule
Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities.
Checks: C-72278r1038709_chk

Verify that the HYCU device is running a supported version. Log in to the HYCU Web UI. On the menu on the left side of the page, scroll to the bottom, where it shows the running version of HYCU. If HYCU version is not on the list of supported versions, as specified in the End-of-Life Milestones and Dates, this is a finding. Note: The HYCU support portal specifies the HYCU end of life policies. To determine if the system is using a supported version, visit: https://download.hycu.com/docs/HYCU-EOL-dates.pdf.

Fix: F-72181r1038470_fix

Perform upgrade to the supported HYCU version following upgrade section of user manual.

b
The HYCU virtual appliance must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
CM-6 - Medium - CCI-000366 - V-268258 - SV-268258r1039645_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
HYCU-ND-000500
Vuln IDs
  • V-268258
Rule IDs
  • SV-268258r1039645_rule
For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority will suffice. Satisfies: SRG-APP-000516-NDM-000344, SRG-APP-000910-NDM-000300
Checks: C-72279r1039644_chk

Open a new HYCU Web UI browser tab and verify there is no warning prompt before proceeding to the Web UI login page. If a warning appears in the web browser stating, "Not secure", this is a finding.

Fix: F-72182r1038712_fix

Log in to the HYCU Web UI and generate a CSR within the gear menu and "SSL Certificates" menu. Submit this CSR to a DOD PKI authority to have a new certificate created. Note: By default, HYCU is configured with a self-signed certificate, but this can be replaced with a DOD-issued certificate. This certificate can be configured by logging in to the HYCU Web UI, navigating to the gear menu and "SSL Certificates" menu, and importing the DOD-issued certificate.

c
The HYCU virtual appliance must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.
CM-7 - High - CCI-000382 - V-268259 - SV-268259r1038477_rule
RMF Control
CM-7
Severity
High
CCI
CCI-000382
Version
HYCU-ND-000510
Vuln IDs
  • V-268259
Rule IDs
  • SV-268259r1038477_rule
To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable unused or unnecessary physical and logical ports/protocols on information systems. Network devices are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Additionally, it is sometimes convenient to provide multiple services from a single component (e.g., email and web services); however, doing so increases risk over limiting the services provided by any one component. To support the requirements and principles of least functionality, the network device must support the organizational requirements providing only essential capabilities and limiting the use of ports, protocols, and/or services to only those required, authorized, and approved. Some network devices have capabilities enabled by default; if these capabilities are not necessary, they must be disabled. If a particular capability is used, then it must be documented and approved.
Checks: C-72280r1038475_chk

Verify the SSHD daemon has been disabled using the following command: $ sudo systemctl status sshd Loaded: loaded (/usr/lib/systemd/system/sshd.service; disabled) Active: inactive (dead) If the SSHD daemon is not disabled and inactive or is not documented and approved for use, this is a finding.

Fix: F-72183r1038476_fix

Stop the SSHD daemon using the following command: $ sudo systemctl stop sshd Disable the SSHD daemon using the following command: $ sudo systemctl disable sshd Note: The service must be stopped before it can be disabled.

b
The HYCU virtual appliance must implement replay-resistant authentication mechanisms for network access to privileged accounts.
IA-2 - Medium - CCI-001941 - V-268260 - SV-268260r1038716_rule
RMF Control
IA-2
Severity
Medium
CCI
CCI-001941
Version
HYCU-ND-000520
Vuln IDs
  • V-268260
Rule IDs
  • SV-268260r1038716_rule
A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be vulnerable to a replay attack. An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Techniques used to address this include protocols using nonces (e.g., numbers generated for a specific one-time use) or challenges (e.g., TLS, WS_Security). Additional techniques include time-synchronous or challenge-response one-time authenticators.
Checks: C-72281r1038714_chk

The use of SSH-2 protocol for network/remote access prevents replay attacks. The SSH-2 protocol is the standard for the SSH daemon in the Linux OS used by HYCU. To determine the SSH version in use, log in to the HYCU console and execute the following command: ssh -v localhost If the output does not show remote protocol version 2.0 in use, this is a finding. HYCU web access uses TLS, which addresses this threat. HYCU web access cannot be configured to not use TLS.

Fix: F-72184r1038715_fix

Log in to the HYCU console and configure SSH to use the SSH-2 protocol by editing the protocol variable in the file "/etc/ssh/sshd_config".

b
The HYCU virtual appliance must enforce password complexity by requiring that at least one uppercase character be used.
- Medium - CCI-004066 - V-268262 - SV-268262r1038718_rule
RMF Control
Severity
Medium
CCI
CCI-004066
Version
HYCU-ND-000540
Vuln IDs
  • V-268262
Rule IDs
  • SV-268262r1038718_rule
Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Multifactor authentication (MFA) is required for all administrative and user accounts on network devices, except for an account of last resort and (where applicable) a root account. Passwords should only be used when MFA using PKI is not available, and for the account of last resort and root account.
Checks: C-72283r1038717_chk

Log in to the HYCU VM console. Check for the value of the "minclass" option in "/etc/security/pwquality.conf" with the following command: grep minclass /etc/security/pwquality.conf If the minclass value is not set to "5", this is a finding.

Fix: F-72186r1038485_fix

Configure the operating system to enforce a minimum class setting. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minclass = 5

b
The HYCU virtual appliance must enforce password complexity by requiring that at least one lowercase character be used.
- Medium - CCI-004066 - V-268263 - SV-268263r1038720_rule
RMF Control
Severity
Medium
CCI
CCI-004066
Version
HYCU-ND-000550
Vuln IDs
  • V-268263
Rule IDs
  • SV-268263r1038720_rule
Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Multifactor authentication (MFA) is required for all administrative and user accounts on network devices, except for an account of last resort and (where applicable) a root account. Passwords should only be used when MFA using PKI is not available, and for the account of last resort and root account.
Checks: C-72284r1038719_chk

Log in to the HYCU VM console. Check for the value of the "minclass" option in "/etc/security/pwquality.conf" with the following command: grep minclass /etc/security/pwquality.conf If the minclass value is not set to "5", this is a finding.

Fix: F-72187r1038488_fix

Configure the operating system to enforce a minimum class setting. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minclass = 5

b
The HYCU virtual appliance must enforce password complexity by requiring that at least one numeric character be used.
- Medium - CCI-004066 - V-268264 - SV-268264r1038722_rule
RMF Control
Severity
Medium
CCI
CCI-004066
Version
HYCU-ND-000560
Vuln IDs
  • V-268264
Rule IDs
  • SV-268264r1038722_rule
Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Multifactor authentication (MFA) is required for all administrative and user accounts on network devices, except for an account of last resort and (where applicable) a root account. Passwords should only be used when MFA using PKI is not available, and for the account of last resort and root account.
Checks: C-72285r1038721_chk

Log in to the HYCU VM console. Check for the value of the "minclass" option in "/etc/security/pwquality.conf" with the following command: grep minclass /etc/security/pwquality.conf If the minclass value is not set to "5", this is a finding.

Fix: F-72188r1038491_fix

Configure the operating system to enforce a minimum class setting. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minclass = 5

b
The HYCU virtual appliance must enforce password complexity by requiring that at least one special character be used.
- Medium - CCI-004066 - V-268265 - SV-268265r1038724_rule
RMF Control
Severity
Medium
CCI
CCI-004066
Version
HYCU-ND-000570
Vuln IDs
  • V-268265
Rule IDs
  • SV-268265r1038724_rule
Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Multifactor authentication (MFA) is required for all administrative and user accounts on network devices, except for an account of last resort and (where applicable) a root account. Passwords should only be used when MFA using PKI is not available, and for the account of last resort and root account.
Checks: C-72286r1038723_chk

Log in to the HYCU VM console. Check for the value of the "minclass" option in "/etc/security/pwquality.conf" with the following command: grep minclass /etc/security/pwquality.conf If the minclass value is not set to "5", this is a finding.

Fix: F-72189r1038494_fix

Configure the operating system to enforce a minimum class setting. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minclass = 5

b
The HYCU virtual appliance must enforce a minimum 15-character password length.
- Medium - CCI-004066 - V-268266 - SV-268266r1038758_rule
RMF Control
Severity
Medium
CCI
CCI-004066
Version
HYCU-ND-000580
Vuln IDs
  • V-268266
Rule IDs
  • SV-268266r1038758_rule
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to determine strength and how long it takes to crack a password. The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Use of more characters in a password helps to exponentially increase the time and/or resources required to compromise the password.
Checks: C-72287r1038496_chk

Check for the value of the "minlen" option in "/etc/security/pwquality.conf" with the following command: grep minlen /etc/security/pwquality.conf If the minlen value is not set to "15", this is a finding. Check for the value of the "user.password.min.length" variable in "/opt/grizzly/config.properties" HYCU configuration file with the following command: grep user.password.min.length /opt/grizzly/config.properties If the value is not set to 15 or more, this is a finding.

Fix: F-72190r1038757_fix

Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value). minlen = 15 Add or modify the following line in the /opt/grizzly/config.properties configuration file: user.password.min.length=15 Reload the HYCU application by running the following command: sudo systemctl reload grizzly

b
The HYCU virtual appliance must require that when a password is changed, the characters are changed in at least eight of the positions within the password.
- Medium - CCI-004066 - V-268267 - SV-268267r1038760_rule
RMF Control
Severity
Medium
CCI
CCI-004066
Version
HYCU-ND-000590
Vuln IDs
  • V-268267
Rule IDs
  • SV-268267r1038760_rule
If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at guessing and brute-force attacks. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. In other words, characters may be the same within the two passwords; however, the positions of the like characters must be different. Multifactor authentication (MFA) is required for all administrative and user accounts on network devices, except for an account of last resort and (where applicable) a root account. Passwords should only be used when MFA using PKI is not available, and for the account of last resort and root account.
Checks: C-72288r1038759_chk

Verify the value of the "difok" option with the following command: $ sudo grep -r difok /etc/security/pwquality.conf* /etc/security/pwquality.conf:difok = 8 If the value of "difok" is set to less than "8" or is commented out, this is a finding. If conflicting results are returned, this is a finding.

Fix: F-72191r1038500_fix

Configure the operating system to require the change of at least eight of the total number of characters when passwords are changed by setting the "difok" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): difok = 8 Remove any configurations that conflict with the above value.

c
The HYCU virtual appliance must use FIPS 140-2-approved algorithms for authentication to a cryptographic module.
IA-7 - High - CCI-000803 - V-268269 - SV-268269r1038744_rule
RMF Control
IA-7
Severity
High
CCI
CCI-000803
Version
HYCU-ND-000620
Vuln IDs
  • V-268269
Rule IDs
  • SV-268269r1038744_rule
Unapproved mechanisms that are used for authentication to the cryptographic module are not validated and therefore cannot be relied upon to provide confidentiality or integrity, and DOD data may be compromised. Network devices utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules. FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meets DOD requirements. However, authentication algorithms must configure security processes to use only FIPS-approved and NIST-recommended authentication algorithms.
Checks: C-72290r1038505_chk

When FIPS mode is enabled, the HYCU application will use FIPS-compliant behavior. Validate the FIPS status using the following command: 'cat /proc/sys/crypto/fips_enabled' If command output does not show "1", this is a finding. 'fips-mode-setup --check' If command output does not show "FIPS mode is enabled", this is a finding. 'update-crypto-policies --show' If command output does not show "FIPS", this is a finding.

Fix: F-72193r1038506_fix

Stop the HYCU web server: sudo systemctl stop grizzly.service Enable FIPS-compliant mode: sudo /opt/grizzly/bin/enable_fips.sh Reboot the HYCU virtual machines: shutdown -r now

c
The HYCU virtual appliance must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.
MA-4 - High - CCI-002890 - V-268270 - SV-268270r1038745_rule
RMF Control
MA-4
Severity
High
CCI
CCI-002890
Version
HYCU-ND-000630
Vuln IDs
  • V-268270
Rule IDs
  • SV-268270r1038745_rule
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied on to provide confidentiality or integrity, and DOD data may be compromised. Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the internet) or an internal network. Currently, HMAC is the only FIPS-approved algorithm for generating and verifying message/data authentication codes in accordance with FIPS 198-1. Products that are FIPS 140-2-validated will have an HMAC that meets specification; however, the option must be configured for use as the only message authentication code used for authentication to cryptographic modules. Separate requirements for configuring applications and protocols used by each application (e.g., SNMPv3, SSHv2, NTP, HTTPS, and other protocols and applications that require server/client authentication) are required to implement this requirement. Where SSH is used, the SSHv2 protocol suite is required because it includes Layer 7 protocols such as SCP and SFTP, which can be used for secure file transfers.
Checks: C-72291r1038508_chk

When FIPS mode is enabled, the HYCU application will use FIPS-compliant behavior. Validate the FIPS status using the following command: 'cat /proc/sys/crypto/fips_enabled' If command output does not show "1", this is a finding. 'fips-mode-setup --check' If command output does not show "FIPS mode is enabled", this is a finding. 'update-crypto-policies --show' If command output does not show "FIPS", this is a finding.

Fix: F-72194r1038509_fix

Stop the HYCU web server: sudo systemctl stop grizzly.service Enable FIPS-compliant mode: sudo /opt/grizzly/bin/enable_fips.sh Reboot the HYCU virtual appliance: shutdown -r now

c
The HYCU virtual appliance must be configured to implement cryptographic mechanisms using a FIPS 140-2-approved algorithm to protect the confidentiality of remote maintenance sessions.
MA-4 - High - CCI-003123 - V-268271 - SV-268271r1038746_rule
RMF Control
MA-4
Severity
High
CCI
CCI-003123
Version
HYCU-ND-000640
Vuln IDs
  • V-268271
Rule IDs
  • SV-268271r1038746_rule
This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to eavesdropping, potentially putting sensitive data (including administrator passwords) at risk of compromise and potentially allowing hijacking of maintenance sessions.
Checks: C-72292r1038511_chk

When FIPS mode is enabled, the HYCU application will use FIPS-compliant behavior. Validation of FIPS status can be done using the following commands: 'cat /proc/sys/crypto/fips_enabled' If command output does not show "1", this is a finding. 'fips-mode-setup --check' If command output does not show "FIPS mode is enabled", this is a finding. 'update-crypto-policies --show' If command output does not show "FIPS", this is a finding.

Fix: F-72195r1038512_fix

Stop the HYCU web server: sudo systemctl stop grizzly.service Enable FIPS-compliant mode: sudo /opt/grizzly/bin/enable_fips.sh Reboot the HYCU virtual appliance: shutdown -r now

b
The HYCU virtual appliance must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.
AC-2 - Medium - CCI-001358 - V-268274 - SV-268274r1038763_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-001358
Version
HYCU-ND-000670
Vuln IDs
  • V-268274
Rule IDs
  • SV-268274r1038763_rule
Authentication for administrative (privileged level) access to the device is required at all times. An account can be created on the device's local database for use when the authentication server is down or connectivity between the device and the authentication server is not operable. This account is referred to as the account of last resort since it is intended to be used as a last resort and when immediate administrative access is absolutely necessary.
Checks: C-72295r1038761_chk

Log in to HYCU UI and ensure that admin user is the only user configured with HYCU Authentication type. If any other user except for built-in admin is configured with HYCU Authentication type, this is a finding. Log in to HYCU console, run the command "cat /etc/passwd" within the HYCU console and ensure no nondefault user account configured. If any other user apart from HYCU user is configured to access HYCU console, this is a finding.

Fix: F-72198r1038762_fix

Log in to the HYCU Web UI, select Self-Service on the left menu. Then select Manage Users. Delete all users configured with HYCU Authentication type except from the built-in admin user. To check for any unauthorized users on the VM Console, run the following command: cat /etc/passwd Use the "userdel" command to remove any unauthorized users.

b
The HYCU virtual appliance must audit the enforcement actions used to restrict access associated with changes to the device.
- Medium - CCI-003938 - V-268282 - SV-268282r1038736_rule
RMF Control
Severity
Medium
CCI
CCI-003938
Version
HYCU-ND-000750
Vuln IDs
  • V-268282
Rule IDs
  • SV-268282r1038736_rule
Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to identify attempted attacks, and an audit trail will not be available for forensic investigation for after-the-fact actions. Enforcement actions are the methods or mechanisms used to prevent unauthorized changes to configuration settings. Enforcement action methods may be as simple as denying access to a file based on the application of file permissions (access restriction). Audit items may consist of lists of actions blocked by access restrictions or changes identified after the fact.
Checks: C-72303r1038734_chk

Check the contents of the "/var/log/audit/audit.log" file. Verify the audit log contains records showing when unsuccessful login attempts occur. If the audit log is not configured or does not have required contents, this is a finding. HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu. Log in with incorrect credentials and check the HYCU Events. If the HYCU event of category "SECURITY" and status "Warning" is not logged, this is a finding.

Fix: F-72206r1038735_fix

Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load

b
The HYCU virtual appliance must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- Medium - CCI-003992 - V-268283 - SV-268283r1038766_rule
RMF Control
Severity
Medium
CCI
CCI-003992
Version
HYCU-ND-000760
Vuln IDs
  • V-268283
Rule IDs
  • SV-268283r1038766_rule
Changes to any software components can have significant effects on the overall security of the network device. Verifying software components have been digitally signed using a certificate that is recognized and approved by the organization ensures the software has not been tampered with and has been provided by a trusted vendor. Accordingly, patches, service packs, or application components must be signed with a certificate recognized and approved by the organization. Verifying the authenticity of the software prior to installation validates the integrity of the patch or upgrade received from a vendor. This ensures the software has not been tampered with and has been provided by a trusted vendor. Self-signed certificates are disallowed by this requirement. The device should not have to verify the software again. This requirement does not mandate DOD certificates for this purpose; however, the certificate used to verify the software must be from an approved CA.
Checks: C-72304r1038764_chk

Verify the operating system prevents the installation of patches, service packs, device drivers, or operating system components from a repository without verification that they have been digitally signed using a certificate that is recognized and approved by the organization. Check that YUM verifies the signature of packages from a repository prior to install with the following command: $ sudo grep -E '^\[.*\]|gpgcheck' /etc/yum.repos.d/*.repo /etc/yum.repos.d/appstream.repo:[appstream] /etc/yum.repos.d/appstream.repo:gpgcheck=1 /etc/yum.repos.d/baseos.repo:[baseos] /etc/yum.repos.d/baseos.repo:gpgcheck=1 If "gpgcheck" is not set to "1", or if options are missing or commented out, this is a finding. Execute the following command to check the kernel and cryptographic libraries, as well as the SHA256 checksums of the application files: $ sudo /opt/grizzly/bin/hycu-selftest.sh If the output is not OK for the OS, this is a finding. If the output reports an error for any other file than /etc/issue for the App section, this is a finding.

Fix: F-72207r1038765_fix

Configure the operating system to verify the signature of packages from a repository prior to install by setting the following option in every repo file in /etc/yum.repos.d/: gpgcheck=1 Check the output of "sudo /opt/grizzly/bin/hycu-selftest.sh". Investigate each file listed in the error output to determine a fix.

b
The HYCU virtual appliance must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
SI-2 - Medium - CCI-002605 - V-268296 - SV-268296r1038767_rule
RMF Control
SI-2
Severity
Medium
CCI
CCI-002605
Version
HYCU-ND-000900
Vuln IDs
  • V-268296
Rule IDs
  • SV-268296r1038767_rule
Security flaws with software are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates. Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling must also be addressed expeditiously. Organization-defined time periods for updating security-relevant software may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). This requirement will apply to software patch management solutions that are used to install software patches across the enclave (e.g., mobile device management solutions). Patch criticality, as well as system criticality will vary. Therefore, the tactical situations regarding the patch management process will also vary. This means that the time period used must be a configurable parameter. Time frames for application of security-relevant software updates may be dependent upon the Information Assurance Vulnerability Management (IAVM) process. The application will be configured to check for and install security-relevant software updates within an identified time period from the availability of the update. The specific time period will be defined by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
Checks: C-72317r1038586_chk

Obtain evidence that software updates are consistently applied to the HYCU virtual appliance within the time frame defined for each patch. If such evidence cannot be obtained, or the evidence obtained indicates a pattern of noncompliance, this is a finding. If the HYCU virtual appliance does not install security-relevant updates within the time period directed by the authoritative source, this is a finding.

Fix: F-72220r1038587_fix

Institute and adhere to policies and procedures to ensure that patches are consistently applied to the HYCU virtual appliance within the time allowed.

c
The HYCU virtual appliance must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements.
SC-10 - High - CCI-001133 - V-268301 - SV-268301r1038739_rule
RMF Control
SC-10
Severity
High
CCI
CCI-001133
Version
HYCU-ND-000950
Vuln IDs
  • V-268301
Rule IDs
  • SV-268301r1038739_rule
Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unattended. In addition, quickly terminating an idle session will also free up resources committed by the managed network element.
Checks: C-72322r1038738_chk

Log in to the HYCU VM console. For console connections, check for the value of the "TMOUT" option in "/home/hycu/.bashrc" with the following command: grep TMOUT /home/hycu/.bashrc If the "TMOUT" value is not set to "300" or less, this is a finding. For SSH connections, check for the value of the "ClientAliveInterval" option in "/etc/ssh/sshd_config" with the following command: grep ClientAliveInterval /etc/ssh/sshd_config If the "ClientAliveInterval" value is not set to "5" or less, this is a finding. For UI connections, run the following command to check configured HYCU session timeout: cat /opt/grizzly/config.properties | grep api.session.expiration.minutes If not configured at "5" or less, this is a finding.

Fix: F-72225r1038602_fix

Configure the operating system to enforce timeout settings. Add the following line to "/home/hycu/.bashrc" (or modify the line to have the required value): TMOUT=300 Add the following line to "/etc/ssh/sshd_config" (or modify the line to have the required value): ClientAliveInterval 300 Edit the "/opt/grizzly/config.properties" file by running the command: sudo vi /opt/grizzly/config.properties Add the following line or modify the line to have the required value: api.session.expiration.minutes=5 Save the file by typing: :wq!

b
The HYCU virtual appliance must generate unique session identifiers using a FIPS 140-2 approved random number generator.
SC-23 - Medium - CCI-001188 - V-268302 - SV-268302r1038606_rule
RMF Control
SC-23
Severity
Medium
CCI
CCI-001188
Version
HYCU-ND-000960
Vuln IDs
  • V-268302
Rule IDs
  • SV-268302r1038606_rule
Sequentially generated session IDs can be easily guessed by an attacker. Employing the concept of randomness in the generation of unique session identifiers helps to protect against brute-force attacks to determine future session identifiers. Unique session IDs address man-in-the-middle attacks, including session hijacking or insertion of false information into a session. If the attacker is unable to identify or guess the session information related to pending application traffic, they will have more difficulty in hijacking the session or otherwise manipulating valid sessions. This requirement is applicable to devices that use a web interface for device management.
Checks: C-72323r1038604_chk

When FIPS mode is enabled, HYCU will use FIPS-compliant behavior. Validation of FIPS status can be done using the following command: 'cat /proc/sys/crypto/fips_enabled' If command output does not show "1", this is a finding. 'fips-mode-setup --check' If command output does not show "FIPS mode is enabled", this is a finding. 'update-crypto-policies --show' If command output does not show "FIPS", this is a finding.

Fix: F-72226r1038605_fix

Stop the HYCU web server using the following command: sudo systemctl stop grizzly.service Enable FIPS-compliant mode using the following command: sudo /opt/grizzly/bin/enable_fips.sh Reboot the HYCU virtual machines using the following command: shutdown -r now

c
The HYCU virtual appliance must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
AU-4 - High - CCI-001851 - V-268303 - SV-268303r1038770_rule
RMF Control
AU-4
Severity
High
CCI
CCI-001851
Version
HYCU-ND-000970
Vuln IDs
  • V-268303
Rule IDs
  • SV-268303r1038770_rule
The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate security personnel. The stored log data can used to detect weaknesses in security that enable the network IA team to find and address these weaknesses before breaches can occur. Reviewing these logs, whether before or after a security breach, is important in showing whether someone is an internal employee or an outside threat.
Checks: C-72324r1038740_chk

Log in to the HYCU Web UI, navigate to Events &gt;&gt; Notifications &gt;&gt; Webhooks and verify that HYCU is sending required logs to at least at least two central log servers. If two webhooks sending required HYCU events to at least two central log servers are not configured, this is a finding.

Fix: F-72227r1038769_fix

Setting up webhook-based notifications in HYCU allows users to receive alerts and updates about all activities related to the HYCU environment, including job status, errors, and warnings. This ensures users stay informed about the status of the events and can take appropriate actions if needed. Use HYCU Webhooks to send HYCU events from the HYCU VM to a central logging server (e.g., Splunk, SolarWinds). Configure the webhooks notifications by navigating to Events >> Notifications >> Webhooks and adding a new Webhook. Use the "Category" and "Status" fields to filter type of events sent out based on organizational requirements. For more detailed procedures, consult the following: https://support.hycu.com/hc/en-us/articles/11825154101532-Configuring-Splunk-Webhook-with-HYCU.