Multifunction Device and Network Printers STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 7
Comparison against the immediately-prior release (V2R7). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 7
- V-6794 Medium descriptioncheckfix A MFD or printer is not configured to restrict jobs to those from print spoolers.
- V-6796 Medium description Print spoolers are not configured to restrict access to authorized users and restrict users to managing their own individual jobs.
- V-6797 Medium description The devices and their spoolers do not have auditing enabled.
- V-6798 Low description Implementation of an MFD and printer security policy for the protection of classified information.
- V-6799 Low description The level of audit has not been established or the audit logs being collected for the devices and print spoolers are not being reviewed.
- V-6803 Low description Auditing of user access and fax logs must be enabled when fax from the network is enabled.
- V-6805 Medium description A MFD device does not have a mechanism to lock and prevent access to the hard drive.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD01.001
- Vuln IDs
-
- V-6777
- Rule IDs
-
- SV-6999r1_rule
Checks: C-2941r1_chk
The reviewer will, with the assistance of the SA, verify that the only network protocol enabled is TCP/IP.
Fix: F-6430r1_fix
Disable all protocols in the MFD except TCP/IP.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD01.002
- Vuln IDs
-
- V-6778
- Rule IDs
-
- SV-7000r1_rule
Checks: C-2951r1_chk
The reviewer will, with the assistance of the SA, verify that the MFD or printer is assigned a static IP address.
Fix: F-6431r1_fix
Reconfigure the MFD or printer, assigning it a static IP address. One acceptable method could also be implemented using DHCP. The printer may be configured to obtain an IP address from DHCP, however, the IP reservation must be configured such that the address cannot ever be assigned to another device.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD01.003
- Vuln IDs
-
- V-6779
- Rule IDs
-
- SV-7001r1_rule
Checks: C-2954r1_chk
The reviewer will interview the SA to verify that there is a firewall or router rule to block all ingress and egress traffic from the enclave perimeter to the MFD or printer.
Fix: F-6432r1_fix
Ensure that there is a firewall or router rule to block all ingress and egress traffic from the enclave perimeter to the MFD or printer.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD02.004
- Vuln IDs
-
- V-6780
- Rule IDs
-
- SV-7002r1_rule
Checks: C-2965r1_chk
The reviewer will, with the assistance of the SA, verify that the devices are flash upgradeable and are configured to use the most current firmware available.
Fix: F-6433r1_fix
If the MFD or printer cannot be upgraded replace it. If the MFD or printer can be upgraded but is not using the latest release of the firmware, upgrade the firmware.
- RMF Control
- Severity
- H
- CCI
- Version
- MFD02.001
- Vuln IDs
-
- V-6781
- Rule IDs
-
- SV-7003r2_rule
Checks: C-2966r2_chk
The reviewer will, with assistance from the SA, verify the default passwords and SNMP community strings of all management services have been replaced with complex passwords.
Fix: F-6434r1_fix
Develop a plan to coordinate the modification of the default passwords and SNMP community strings of all management services replacing them with complex passwords. Obtain CM approval of the plan and execute the plan.
- RMF Control
- Severity
- H
- CCI
- Version
- MFD02.002
- Vuln IDs
-
- V-6782
- Rule IDs
-
- SV-7004r1_rule
Checks: C-2968r1_chk
Interview the SA and review the MFD documentation to verify that the MFD will maintain its configuration state (passwords, service settings etc) after a power down or reboot.
Fix: F-6435r1_fix
Replace the MFD with a MFD that will maintain its configuration state (passwords, service settings etc) after a power down or reboot.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD02.003
- Vuln IDs
-
- V-6783
- Rule IDs
-
- SV-7005r2_rule
Checks: C-2969r2_chk
Verify that all management protocols are disabled unless approved by the organization's AO/ISSM. Protocols may be enabled temporarily if needed to upgrade firmware or configure the device, but must be disabled immediately when this activity is completed. HTTPS and SNMPv3 may be used but must be configured in accordance with the requirements of the Network Infrastructure STIG. If management protocols other than HTTPS and SNMPv3 are enabled unnecessarily or without AO/ISSM approval, this is a finding.
Fix: F-6436r2_fix
Disable all management protocols except HTTPS and SNMPv3 unless approval has been granted by the organization's AO/ISSM.
- RMF Control
- Severity
- H
- CCI
- Version
- MFD02.005
- Vuln IDs
-
- V-6784
- Rule IDs
-
- SV-7009r1_rule
Checks: C-2984r1_chk
The reviewer will, with the assistance of the SA, verify that the MFD or printer can only be remotely managed by SA or printer administrator from specific IPs (SA workstations and print spooler). Look for list that restricts the protocol used for administrative access to specific IP addresses.
Fix: F-6447r1_fix
Restrict access to the MFD's or printer's management function to a specific set of IP addresses. If the device lacks this functionality use an ACL in a router, firewall or switch to restrict the access.
- RMF Control
- Severity
- L
- CCI
- Version
- MFD03.001
- Vuln IDs
-
- V-6790
- Rule IDs
-
- SV-7015r1_rule
Checks: C-2994r1_chk
The reviewer will, with the assistance of the SA, verify that the MFD or printer print services are restricted to LPD or port 9100. Where both Windows and non-Windows clients need services from the same device, both Port 9100 and LPD can be enabled simultaneously.
Fix: F-6456r1_fix
Develop a plan to coordinate the reconfiguration of the printer servers and clients so that print services runs only on authorized ports. Obtain CM approval of the plan and implement the plan.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD04.001
- Vuln IDs
-
- V-6794
- Rule IDs
-
- SV-7019r2_rule
Checks: C-2998r2_chk
The reviewer will, with the assistance of the SA, verify that MFDs and printers are configured to restrict jobs only to print spoolers, not directly from users. If print jobs are sent directly to the MFD or printer, this is a finding. If direct wireless printing is enabled on the MFD or printer, this is a finding.
Fix: F-6461r2_fix
Reconfigure the device to restrict access, by IP, to those of the print spoolers and SAs. If the device does not support this functionality, place the device behind a firewall, switch or router with an appropriate discretionary access control list. Disable direct wireless printing on the MFD or printer.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD05.001
- Vuln IDs
-
- V-6796
- Rule IDs
-
- SV-7021r1_rule
Checks: C-3002r1_chk
The reviewer will, with the assistance of the SA, verify that the print spoolers are configured to restrict access to authorized users and restrict users to managing their own individual jobs.
Fix: F-6463r1_fix
Configure the print spoolers to restrict access to authorized users and restrict users to managing their own individual jobs.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD06.001
- Vuln IDs
-
- V-6797
- Rule IDs
-
- SV-7022r1_rule
Checks: C-3005r1_chk
The reviewer will, with the assistance of the SA, verify that devices and their spoolers have auditing fully enabled.
Fix: F-6465r1_fix
Configure the devices and their spoolers have auditing fully enabled.
- RMF Control
- Severity
- L
- CCI
- Version
- MFD06.002
- Vuln IDs
-
- V-6798
- Rule IDs
-
- SV-7023r2_rule
Checks: C-3006r2_chk
Obtain and review the organization's MFD and printer security policy. If none is provided, this is a finding. If it does not prescribe the appropriate safeguards listed below, this is a finding. Safeguards to be listed in the organization's MFD and printer security policy; a. Prevent unauthorized access to that information, including by repair or maintenance personnel. b. Ensure that repair procedures do not result in unauthorized dissemination of or access to classified information. c. Replace and destroy equipment parts in the appropriate manner when classified information cannot be removed. d. Ensure that appropriately knowledgeable, cleared personnel inspect equipment and associated media used to process classified information before the equipment is removed from protected areas to ensure there is no retained classified information. e. Ensure MFD and printers used to process classified information are certified and accredited in accordance with DoDD 8500.01E. f. Ensure that MFD and printers address issues concerning compromising emanations in accordance with DoDD C-5200.19.
Fix: F-6467r2_fix
Develop and implement an MFD and printer security policy consistent with DoDM 5200.01, Volume 3, Section 14.
- RMF Control
- Severity
- L
- CCI
- Version
- MFD06.006
- Vuln IDs
-
- V-6799
- Rule IDs
-
- SV-7024r2_rule
Checks: C-3009r2_chk
Obtain and review the organization's MFD and printer security policy. If the level of auditing has not been established, this is a finding. If personnel have not been identified to regularly review MFD, printer, and print spooler logs, this is a finding.
Fix: F-6470r2_fix
Define the level of auditing and identify personnel responsible for reviewing audit logs of MFDs, printers, and print spoolers.
- RMF Control
- Severity
- H
- CCI
- Version
- MFD07.001
- Vuln IDs
-
- V-6800
- Rule IDs
-
- SV-7025r2_rule
Checks: C-3012r4_chk
The reviewer will interview the IAO to verify that MFDs with print, copy, scan, or fax capabilities are prohibited on classified networks unless approved by the DAA.
Fix: F-6472r4_fix
Remove the MFD from the classified network until DAA approval is obtained.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD07.002
- Vuln IDs
-
- V-6801
- Rule IDs
-
- SV-7026r1_rule
Checks: C-3016r1_chk
The reviewer, with the assistance of the SA, verify the device is configured to clear the hard disk between jobs if scan to hard disk functionality is used. Note: This policy is a security-in-depth measure and applies to normal use. Thus, the clearing algorithm does not have to comply with DoD sanitization procedures. Proper sanitization using a DoD compliant procedure will be required only for final destruction/disposition. Note: This does not apply if PKI authenticated access and discretionary access controls (authorization controls) are used to protect the stored data.
Fix: F-6475r1_fix
Configured the MFD to clear the hard disk between jobs if scan to hard disk functionality is used.
- RMF Control
- Severity
- L
- CCI
- Version
- MFD07.003
- Vuln IDs
-
- V-6802
- Rule IDs
-
- SV-7027r1_rule
Checks: C-3017r1_chk
The reviewer will, with the assistance of the SA, verify that file shares have the appropriate discretionary access control list in place if scan to a file share is enabled.
Fix: F-6476r1_fix
Create the appropriate discretionary access control list for file shares if scan to a file share is enabled.
- RMF Control
- Severity
- L
- CCI
- Version
- MFD07.004
- Vuln IDs
-
- V-6803
- Rule IDs
-
- SV-7028r2_rule
Checks: C-3018r2_chk
The reviewer will, with the assistance from the SA, verify auditing of user access and fax logging is enabled if fax from the network is enabled. If auditing of user access and fax logging is not enabled, this is a finding.
Fix: F-6477r2_fix
Configure the MFD to audit faxing. If this is not possible, disable the fax functionality and disconnect the phone line from the MFD.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD07.005
- Vuln IDs
-
- V-6804
- Rule IDs
-
- SV-7029r2_rule
Checks: C-3019r2_chk
The reviewer will, with the assistance from the SA, verify devices do not allow scan to SMTP. If scan to SMTP is enabled on the MFD, this is a finding. Note: With AO approval, strict usage policies, and user training, MFD scan to SMTP (email) is allowed if CAC/PKI authentication is implemented on the MFD. There must be a method implemented for non-repudiation and authenticated access. A USB/flash drive/thumb drive or any removable storage capability will not be installed.
Fix: F-6478r1_fix
Disable the scan to SMTP (email) feature on all MFDs.
- RMF Control
- Severity
- M
- CCI
- Version
- MFD08.001
- Vuln IDs
-
- V-6805
- Rule IDs
-
- SV-7030r1_rule
Checks: C-3020r1_chk
The reviewer will, with the assistance of the SA, verify that the device has a mechanism to lock and prevent access to the hard disk. What we are looking for here is a locking mechanism with a key securing the hard drive or the case access to the hard drive. The lock will be locked or this is a finding. Note: This is not required if physical security measures are in place, if the drive is not easily removable, if drive is encrypted, or if there is zeroization or other strong protection mechanism.
Fix: F-6479r1_fix
If the lock is not locked, lock it. If there is no lock see if the vendor makes one and if so acquire it an lock the drive. If the vendor does not supply a lock, acquire an aftermarket lock that will secure the drive so that it cannot be accessed. Even a drive that cannot be removed but the connectors can be removed is vulnerable.
- RMF Control
- Severity
- H
- CCI
- Version
- MFD08.002
- Vuln IDs
-
- V-6806
- Rule IDs
-
- SV-7031r1_rule
Checks: C-3021r1_chk
The reviewer will, with the assistance of the SA, verify that the device is configured to prevent non-printer administrators from altering the global configuration of the device.
Fix: F-6480r1_fix
Configured the device to prevent non-printer administrators from altering the global configuration of the device. If the device cannot be configured in this manner, replace the device with one that can be configured in an acceptable manner.