Network Device Management Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −8 ✎ 8
Comparison against the immediately-prior release (V2R14). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 8
- V-55081 Medium The network device must compare internal information system clocks at least every 24 hours with an authoritative time server.
- V-55083 Medium The network device must synchronize internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period.
- V-55087 Medium The network device must provide audit record generation capability for DoD-defined auditable events within the network device.
- V-55169 Medium The network device must protect audit information from any type of unauthorized read access.
- V-55177 Medium The application must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
- V-55195 Medium The network device must automatically terminate a network administrator session after organization-defined conditions or trigger events requiring session disconnect.
- V-55285 Medium The network device must generate audit records for all account creations, modifications, disabling, and termination events.
- V-55289 Medium The network device must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Content changes 8
- V-55055 Medium checkfix The network device must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.
- V-55153 High check The network device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
- V-55231 Medium checkfix The network device must be configured to synchronize internal information system clocks using redundant authoritative time sources.
- V-55255 Medium checkfix The Cisco router must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
- V-55267 High checkfix The network device must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions
- V-55299 Medium checkfix The network device must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.
- V-55307 Medium checkfix The network device must be configured to to conduct backups of system level information contained in the information system when changes occur.
- V-64001 Medium check The network device must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-NDM-000200
- Vuln IDs
-
- V-55027
- Rule IDs
-
- SV-69273r2_rule
Checks: C-55649r2_chk
Review the network device configuration to see if the device limits the number of concurrent sessions to an organization-defined number for all administrator accounts and/or administrator account types. If the network device does not limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type, this is a finding.
Fix: F-59893r2_fix
Configure the network device to limit the number of concurrent sessions to an organization-defined number for all administrator accounts and/or administrator account types.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SRG-APP-000002-NDM-000201
- Vuln IDs
-
- V-55029
- Rule IDs
-
- SV-69275r1_rule
Checks: C-55651r1_chk
Review the network device configuration to see if the device conceals information previously visible on the display with a publicly viewable image during the session lock. This can be demonstrated by the network administrator. If previously visible information is not concealed with a publicly viewable image by the session lock, this is a finding.
Fix: F-59895r1_fix
Configure the network device to conceal information previously visible on the display with a publicly viewable image during the session lock.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-APP-000003-NDM-000202
- Vuln IDs
-
- V-55031
- Rule IDs
-
- SV-69277r1_rule
Checks: C-55653r1_chk
Review the network device configuration to see if it initiates a session lock after a 15-minute period of inactivity. This may be verified by configuration check or demonstration. If a session lock is not initiated after a 15-minute period of inactivity, this is a finding.
Fix: F-59897r1_fix
Configure the network device to initiate a session lock after a 15-minute period of inactivity.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000058
- Version
- SRG-APP-000004-NDM-000203
- Vuln IDs
-
- V-55033
- Rule IDs
-
- SV-69279r2_rule
Checks: C-55655r2_chk
Directly observe the management application or the console; if an administrator cannot directly initiate a session lock from either the management application or the console, this is a finding.
Fix: F-59899r2_fix
This is an intrinsic capability of the client application or the console. Many terminal emulation clients implement this capability through software flow control or XOFF/XON flow control.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SRG-APP-000005-NDM-000204
- Vuln IDs
-
- V-55035
- Rule IDs
-
- SV-69281r1_rule
Checks: C-55657r1_chk
Review the network device configuration to determine if the device retains session lock until the administrator re-authenticates. This may be verified by configuration check, demonstration, or other validation test results. If the device does not require re-authentication before releasing the session lock, this is a finding.
Fix: F-59901r1_fix
Configure the network device to retain session lock until the administrator re-authenticates.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000023-NDM-000205
- Vuln IDs
-
- V-55037
- Rule IDs
-
- SV-69283r4_rule
Checks: C-55659r4_chk
Review the device configuration or documentation. Verify device has applications and automated tools for account management functions including: assignment of group or role membership; identifying account type; specifying user access authorizations (i.e., privileges); account removal, update, or termination; and administrative alerts. If the network device does not provide automated support for account management functions, this is a finding.
Fix: F-59903r4_fix
Configure the network device to provide automated support for account management functions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-NDM-000206
- Vuln IDs
-
- V-55039
- Rule IDs
-
- SV-69285r1_rule
Checks: C-55661r1_chk
Review the network device configuration to determine if it automatically disables or removes temporary accounts after 72 hours or is configured to use an authentication server that would perform this function. If the use of temporary accounts is prohibited, this is not a finding. If the network device or its associated authentication server does not automatically disable or remove temporary accounts after 72 hours, this is a finding.
Fix: F-59905r1_fix
Configure the network device or its associated authentication server to automatically disable or remove temporary accounts after 72 hours. An acceptable method would be to place an expiration date on the account upon creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- SRG-APP-000025-NDM-000207
- Vuln IDs
-
- V-55041
- Rule IDs
-
- SV-69287r2_rule
Checks: C-55663r2_chk
Determine if the network device disables account after 35 days of inactivity for all local accounts except for the account of last resort or root account. For non-local accounts, verify that the device is configured to use an authentication server. If the network device does not have the capability to automatically disable or remove accounts after 35 days of inactivity, this is a finding.
Fix: F-59907r3_fix
Configure the network device to automatically disable accounts after 35 days of inactivity. Disable or remove unauthorized local accounts, except for the account of last resort and the root account
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-NDM-000208
- Vuln IDs
-
- V-55043
- Rule IDs
-
- SV-69289r1_rule
Checks: C-55665r1_chk
Review the network device configuration to determine if it automatically audits account creation or is configured to use an authentication server which would perform this function. If account creation is not automatically audited, this is a finding.
Fix: F-59909r1_fix
Configure the network device or its associated authentication server to automatically audit the creation of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-NDM-000209
- Vuln IDs
-
- V-55045
- Rule IDs
-
- SV-69291r1_rule
Checks: C-55667r1_chk
Check the network device to determine if account modification actions are automatically audited. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account modification is not automatically audited, this is a finding.
Fix: F-59911r1_fix
Configure the network device or its associated authentication server to automatically audit the modification of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-NDM-000210
- Vuln IDs
-
- V-55047
- Rule IDs
-
- SV-69293r1_rule
Checks: C-55669r1_chk
Check the network device to determine if account disabling actions are automatically audited. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account disabling actions are not audited, this is a finding.
Fix: F-59913r1_fix
Configure the network device or its associated authentication server to automatically audit the disabling of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-NDM-000211
- Vuln IDs
-
- V-55049
- Rule IDs
-
- SV-69295r1_rule
Checks: C-55671r1_chk
Check the network device to determine if account removal actions are automatically audited. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account removal actions are not automatically audited, this is a finding.
Fix: F-59915r1_fix
Configure the network device or its associated authentication server to automatically audit the removal of accounts.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- SRG-APP-000033-NDM-000212
- Vuln IDs
-
- V-55051
- Rule IDs
-
- SV-69297r2_rule
Checks: C-55673r1_chk
Determine if the network device enforces the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level, this is a finding.
Fix: F-59917r1_fix
Configure the network device to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-APP-000038-NDM-000213
- Vuln IDs
-
- V-55053
- Rule IDs
-
- SV-69299r1_rule
Checks: C-55675r1_chk
Review the network device configuration to determine if it enforces approved authorizations for controlling the flow of management information within the network device based on information flow control policies. If it does not enforce these approved authorizations, this is a finding.
Fix: F-59919r1_fix
Configure the network device to enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-NDM-000214
- Vuln IDs
-
- V-55055
- Rule IDs
-
- SV-69301r2_rule
Checks: C-55677r2_chk
Review the device configuration to verify that it enforces the limit of three consecutive invalid logon attempts. If the device is not configured to enforce the limit of three consecutive invalid logon attempts, this is a finding.
Fix: F-59921r2_fix
Configure the network device to enforce the limit of three consecutive invalid logon attempts during a 15-minute time period.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-APP-000068-NDM-000215
- Vuln IDs
-
- V-55057
- Rule IDs
-
- SV-69303r1_rule
Checks: C-55679r3_chk
Determine if the network device is configured to present a DoD-approved banner that is formatted in accordance with DTM-08-060. If such a banner is not presented, this is a finding. Use the following verbiage for applications that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
Fix: F-59923r1_fix
Configure the network device to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-APP-000069-NDM-000216
- Vuln IDs
-
- V-55059
- Rule IDs
-
- SV-69305r2_rule
Checks: C-55681r2_chk
Determine if the network device is configured to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access. If the network device does not retain the banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access, this is a finding.
Fix: F-59925r2_fix
Configure the network device to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000052
- Version
- SRG-APP-000075-NDM-000217
- Vuln IDs
-
- V-55061
- Rule IDs
-
- SV-69307r1_rule
Checks: C-55683r1_chk
Determine if the network device is either configured to notify the administrator of the date and time of their last login or configured to use an authentication server which would perform this function. If the administrator is not notified of the date and time of the last login upon successful login, this is a finding.
Fix: F-59927r1_fix
Configure the network device to notify the administrator of the date and time of the last login upon successful login.
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000053
- Version
- SRG-APP-000076-NDM-000218
- Vuln IDs
-
- V-55063
- Rule IDs
-
- SV-69309r1_rule
Checks: C-55685r1_chk
Determine if the network device is either configured to notify the administrator of the number of unsuccessful login attempts since the last successful login or configured to use an authentication server which would perform this function. If the administrator is not notified of the number of unsuccessful login attempts since the last successful login, this is a finding.
Fix: F-59929r1_fix
Configure the network device to notify the administrator of the number of unsuccessful login attempts since the last successful login, upon successful login.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000079-NDM-000219
- Vuln IDs
-
- V-55065
- Rule IDs
-
- SV-69311r1_rule
Checks: C-55687r1_chk
Determine if the network device notifies the administrator of changes to access and/or privilege parameters of the administrator's account that occurred since the last logon. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the administrator is not notified of changes to access and/or privilege parameters of the administrator's account that occurred since the last logon, this is a finding.
Fix: F-59931r1_fix
Configure the network device to notify the administrator of changes to access and/or privilege parameters of the administrator's account that occurred since the last logon.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-APP-000343-NDM-000289
- Vuln IDs
-
- V-55067
- Rule IDs
-
- SV-69313r1_rule
Checks: C-55689r1_chk
Determine if the network device audits the execution of privileged functions. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not audit the execution of privileged functions, this is a finding.
Fix: F-59933r1_fix
Configure the network device to audit the execution of privileged functions.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-NDM-000290
- Vuln IDs
-
- V-55069
- Rule IDs
-
- SV-69315r1_rule
Checks: C-55691r1_chk
Determine if the network device automatically locks the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If an account is not automatically locked out until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded, this is a finding.
Fix: F-59935r1_fix
Configure the network device or its associated authentication server to automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000346-NDM-000291
- Vuln IDs
-
- V-55071
- Rule IDs
-
- SV-69317r1_rule
Checks: C-55693r1_chk
Determine if the network device notifies the administrator upon successful logon of the location of last logon (terminal or IP address) in addition to the date and time of the last logon. If the administrator is not notified of the location of last logon (terminal or IP address) upon successful logon, this is a finding.
Fix: F-59937r1_fix
Configure the network device to notify the administrator upon successful logon of the location of last logon (terminal or IP address).
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- SRG-APP-000353-NDM-000292
- Vuln IDs
-
- V-55073
- Rule IDs
-
- SV-69319r1_rule
Checks: C-55695r1_chk
Determine if the network device provides the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time. This requirement may be verified by configuration review or demonstration. If the network device does not provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time, this is a finding.
Fix: F-59939r1_fix
Configure the network device to provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-NDM-000293
- Vuln IDs
-
- V-55075
- Rule IDs
-
- SV-69321r1_rule
Checks: C-55697r1_chk
Determine if the network device allocates audit record storage capacity in accordance with organization-defined audit record storage requirements. This requirement may be verified by configuration review or vendor-provided information. This requirement may be met through use of a properly configured syslog server if the device is configured to use the syslog server. If audit record store capacity is not allocated in accordance with organization-defined audit record storage requirements, this is a finding.
Fix: F-59941r1_fix
Configure the network device to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-NDM-000294
- Vuln IDs
-
- V-55077
- Rule IDs
-
- SV-69323r1_rule
Checks: C-55699r1_chk
Determine if the network device generates an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. This requirement may be verified by configuration review or validated test results. If an immediate alert is not generated when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity, this is a finding.
Fix: F-59943r1_fix
Configure the network device to generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-NDM-000295
- Vuln IDs
-
- V-55079
- Rule IDs
-
- SV-69325r1_rule
Checks: C-55701r1_chk
Determine if the network device generates an immediate alert of all audit failure events requiring real-time alerts. This requirement may be verified by configuration review or validated test results. If an immediate alert of all audit failure events requiring real-time alerts is not generated, this is a finding.
Fix: F-59945r1_fix
Configure the network device to generate an immediate real-time alert of all audit failure events requiring real-time alerts.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-NDM-000220
- Vuln IDs
-
- V-55085
- Rule IDs
-
- SV-69331r1_rule
Checks: C-55707r1_chk
Determine if the network device protects against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. This requires logging all administrator access and configuration activity. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. (Note that two-factor authentication of administrator access is needed to support this requirement.) If the network device does not protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation, this is a finding.
Fix: F-59951r1_fix
Configure the network device or its associated authentication server to protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. Examples that support this include configuring the audit log to capture administration login events and configuration changes to the network device.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-APP-000090-NDM-000222
- Vuln IDs
-
- V-55089
- Rule IDs
-
- SV-69335r2_rule
Checks: C-55711r2_chk
Determine if the network device allows only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If parties other than the ISSM (or individuals or roles appointed by the ISSM) are allowed to select which auditable events are to be audited, this is a finding. If the ISSM (or individuals or roles appointed by the ISSM) is not allowed to select which auditable events are to be audited, this is a finding.
Fix: F-59955r2_fix
Configure the network device settings to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are audited.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-NDM-000223
- Vuln IDs
-
- V-55091
- Rule IDs
-
- SV-69337r1_rule
Checks: C-55713r1_chk
Determine if the network device generates audit records when successful/unsuccessful attempts to access privileges occur. If the network device does not generate audit records when successful/unsuccessful attempts to access privileges occur, this is a finding.
Fix: F-59957r1_fix
Configure the network device to generate audit records when successful/unsuccessful attempts to access privileges occur.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-NDM-000224
- Vuln IDs
-
- V-55093
- Rule IDs
-
- SV-69339r1_rule
Checks: C-55715r1_chk
Determine if the network device initiates session auditing upon startup. This requirement may be verified by validated test results. If the network device does not initiate session auditing upon startup, this is a finding.
Fix: F-59959r1_fix
Configure the network device to initiate session auditing upon startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-NDM-000225
- Vuln IDs
-
- V-55095
- Rule IDs
-
- SV-69341r1_rule
Checks: C-55717r1_chk
Determine if the network device produces audit log records containing sufficient information to establish what type of event occurred. If the network device does not produce audit log records containing sufficient information to establish what type of event occurred, this is a finding.
Fix: F-59961r1_fix
Configure the network device to produce audit log records containing sufficient information to establish what type of event occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-NDM-000226
- Vuln IDs
-
- V-55097
- Rule IDs
-
- SV-69343r1_rule
Checks: C-55719r1_chk
Determine if the network device is configured to produce audit records containing information to establish when (date and time) the events occurred. If the network device does not produce audit records containing information to establish when the events occurred, this is a finding.
Fix: F-59963r1_fix
Configure the network device to produce audit records containing information to establish when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-NDM-000227
- Vuln IDs
-
- V-55099
- Rule IDs
-
- SV-69345r1_rule
Checks: C-55721r1_chk
Determine if the network device is configured to produce audit records containing information to establish where the events occurred. If the network device does not produce audit records containing information to establish where the events occurred, this is a finding.
Fix: F-59965r1_fix
Configure the network device to produce audit records containing information to establish where the events occurred.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- SRG-APP-000142-NDM-000245
- Vuln IDs
-
- V-55101
- Rule IDs
-
- SV-69347r3_rule
Checks: C-55723r2_chk
Determine if the network device prohibits the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services. If any unnecessary or nonsecure functions are permitted, this is a finding.
Fix: F-59967r2_fix
Configure the network device to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- SRG-APP-000148-NDM-000246
- Vuln IDs
-
- V-55103
- Rule IDs
-
- SV-69349r3_rule
Checks: C-55725r2_chk
Determine if the network device uniquely identifies and authenticates organizational administrators. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If organizational administrators are not uniquely identified and authenticated, this is a finding.
Fix: F-59969r1_fix
Configure the network device to uniquely identify and authenticate organizational administrators.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-NDM-000247
- Vuln IDs
-
- V-55105
- Rule IDs
-
- SV-69351r4_rule
Checks: C-55727r4_chk
Determine if the network device is configured to use multifactor authentication for network access to privileged users, including administrator accounts. Network access may use a properly implemented authentication server for validation of credentials. If multifactor authentication is not used for network access to all privileged accounts, this is a finding.
Fix: F-59971r3_fix
Configure the network device to use multifactor authentication for network access to privileged accounts. This requirement does not apply to the account of last resort or root account. DoD prohibits local user accounts on the device, except for an account of last resort and (where applicable) a root account.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- SRG-APP-000151-NDM-000248
- Vuln IDs
-
- V-55107
- Rule IDs
-
- SV-69353r2_rule
Checks: C-55729r3_chk
Determine if the network device uses multifactor authentication for local access to privileged accounts. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If multifactor authentication is not used for local access to privileged accounts, this is a finding.
Fix: F-59973r2_fix
Configure the network device or its associated authentication server to use multifactor authentication for local access to privileged accounts. This control does not apply to the account of last resort or root account. DoD prohibits local user accounts on the device, except for an account of last resort and (where applicable) a root account.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- SRG-APP-000153-NDM-000249
- Vuln IDs
-
- V-55109
- Rule IDs
-
- SV-69355r2_rule
Checks: C-55733r1_chk
Determine if the network device ensures that administrators are authenticated with an individual authenticator prior to using a group authenticator. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not authenticate administrators with an individual authenticator prior to using a group authenticator, this is a finding.
Fix: F-59975r1_fix
Configure the network device to ensure administrators are authenticated with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000156-NDM-000250
- Vuln IDs
-
- V-55111
- Rule IDs
-
- SV-69357r1_rule
Checks: C-55735r1_chk
Determine if the network device implements replay-resistant authentication mechanisms for network access to privileged accounts. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not implement replay-resistant authentication mechanisms for network access to privileged accounts, this is a finding.
Fix: F-59977r1_fix
Configure the network device to implement replay-resistant authentication mechanisms for network access to privileged accounts.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- SRG-APP-000163-NDM-000251
- Vuln IDs
-
- V-55113
- Rule IDs
-
- SV-69359r3_rule
Checks: C-55935r2_chk
Determine if the network device disables identifiers after 35 days of inactivity for all local identifiers except for the account of last resort or root account. For non-local accounts, verify that the device is configured to use an authentication server. If the network device does not have the capability to automatically disable or remove identifiers after 35 days of inactivity, this is a finding.
Fix: F-60179r2_fix
Configure the network device or its associated authentication server to disable identifiers after 35 days of inactivity. For remote logon using the authentication server, configure this capability on the authentication server. Disable or remove unauthorized local identifiers, except for the account of last resort and the root account.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SRG-APP-000164-NDM-000252
- Vuln IDs
-
- V-55115
- Rule IDs
-
- SV-69361r1_rule
Checks: C-55737r1_chk
Determine if the network device or its associated authentication server enforces a minimum 15-character password length. This requirement may be verified by demonstration or configuration review. If the network device or its associated authentication server does not enforce a minimum 15-character password length, this is a finding.
Fix: F-59979r1_fix
Configure the network device or its associated authentication server to enforce a minimum 15-character password length.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- SRG-APP-000165-NDM-000253
- Vuln IDs
-
- V-55117
- Rule IDs
-
- SV-69363r1_rule
Checks: C-55739r1_chk
Determine if the network device or its associated authentication server prohibits password reuse for a minimum of five generations. This requirement may be verified by demonstration or configuration review. If the network device or its associated authentication server does not prohibit password reuse for a minimum of five generations, this is a finding.
Fix: F-59981r1_fix
Configure the network device or its associated authentication server to prohibit password reuse for a minimum of five generations.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- SRG-APP-000166-NDM-000254
- Vuln IDs
-
- V-55119
- Rule IDs
-
- SV-69365r2_rule
Checks: C-55741r2_chk
Where passwords are used, confirm that the network device and associated authentication server enforces password complexity by requiring that at least one upper-case character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device and associated authentication server does not require that at least one upper-case character be used in each password, this is a finding.
Fix: F-59983r2_fix
Configure the network device and associated authentication server to enforce password complexity by requiring that at least one upper-case character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- SRG-APP-000167-NDM-000255
- Vuln IDs
-
- V-55121
- Rule IDs
-
- SV-69367r2_rule
Checks: C-55743r2_chk
Where passwords are used, confirm that the network device and associated authentication server enforces password complexity by requiring that at least one lower-case character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device and associated authentication server does not require that at least one lower-case character be used in each password, this is a finding.
Fix: F-59985r2_fix
Configure the network device and associated authentication server to enforce password complexity by requiring that at least one lower-case character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- SRG-APP-000168-NDM-000256
- Vuln IDs
-
- V-55123
- Rule IDs
-
- SV-69369r2_rule
Checks: C-55745r2_chk
Where passwords are used, confirm that the network device and associated authentication server enforces password complexity by requiring that at least one numeric character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device and associated authentication server does not require that at least one numeric character be used in each password, this is a finding.
Fix: F-59987r2_fix
Configure the network device and associated authentication server to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- SRG-APP-000169-NDM-000257
- Vuln IDs
-
- V-55125
- Rule IDs
-
- SV-69371r2_rule
Checks: C-55747r2_chk
Where passwords are used, confirm that the network device and associated authentication server enforces password complexity by requiring that at least one special character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device and associated authentication server does not require that at least one special character be used in each password, this is a finding.
Fix: F-59989r3_fix
Configure the network device and associated authentication server to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- SRG-APP-000170-NDM-000329
- Vuln IDs
-
- V-55127
- Rule IDs
-
- SV-69373r3_rule
Checks: C-55749r3_chk
Where passwords are used, confirm the characters are changed in at least eight of the positions within the password. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device and associated authentication server does not require that when a password is changed, the characters are changed in at least eight of the positions within the password, this is a finding.
Fix: F-59991r3_fix
Configure the network device and associated authentication server to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-NDM-000228
- Vuln IDs
-
- V-55129
- Rule IDs
-
- SV-69375r1_rule
Checks: C-55731r1_chk
Determine if the network device is configured to produce audit records containing information to establish the source (apparent cause) of the event. If the network device does not produce audit records containing information to establish the source of the event, this is a finding.
Fix: F-59993r1_fix
Configure the network device to produce audit records containing information to establish the source of the event.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- SRG-APP-000171-NDM-000258
- Vuln IDs
-
- V-55131
- Rule IDs
-
- SV-69377r3_rule
Checks: C-55751r2_chk
Review the network device’s files using a text editor or a database tool that allows viewing data stored in database tables. Determine if password strings are readable/discernable. Determine if the network device, and any associated authentication servers, enforce only storing cryptographic representations of passwords. Verify that databases, configuration files, and log files have encrypted representations of all passwords, and that no password strings are readable/discernable. Potential locations include the local file system where configurations and events are stored, or in a network device related database table. Also identify if the network device uses the MD5 hashing algorithm to create password hashes. If the network device, or any associated authentication servers, stores unencrypted (clear text) representations of passwords, this is a finding. If the network device uses MD5 hashing algorithm to create password hashes, this is a finding.
Fix: F-59995r2_fix
Configure the network device, and any associated authentication servers, to store all passwords using cryptographic representations. Configure all associated databases, configuration files, and log files to use only encrypted representations of passwords, and that no password strings are readable/discernable. Potential locations include the local file system where configurations and events are stored, or in a network device-related database table.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-APP-000172-NDM-000259
- Vuln IDs
-
- V-55133
- Rule IDs
-
- SV-69379r2_rule
Checks: C-55753r1_chk
Determine if the network device or its associated authentication server transmits only encrypted representations of passwords. This requirement may be verified by demonstration or configuration review. If the network device or the associated authentication server transmits unencrypted representations of passwords, this is a finding.
Fix: F-59997r1_fix
Configure the network device or its associated authentication server to transmit only encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- SRG-APP-000173-NDM-000260
- Vuln IDs
-
- V-55135
- Rule IDs
-
- SV-69381r3_rule
Checks: C-55755r2_chk
Determine if the network device enforces 24 hours as the minimum password lifetime. This requirement may be verified by demonstration or configuration review. If the network device does not enforce 24 hours as the minimum password lifetime, this is a finding.
Fix: F-59999r2_fix
Configure the network device to enforce 24 hours as the minimum password lifetime.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-NDM-000229
- Vuln IDs
-
- V-55137
- Rule IDs
-
- SV-69383r1_rule
Checks: C-55757r1_chk
Determine if the network device is configured to produce audit records that contain information to establish the outcome of the event. If the network device does not produce audit records that contain information to establish the outcome of the event, this is a finding.
Fix: F-60001r1_fix
Configure the network device to produce audit records that contain information to establish the outcome of the event.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- SRG-APP-000174-NDM-000261
- Vuln IDs
-
- V-55139
- Rule IDs
-
- SV-69385r2_rule
Checks: C-55759r2_chk
Determine if the network device enforces a 60-day maximum password lifetime. This requirement may be verified by demonstration or configuration review. If the network device or its associated authentication server does not enforce a 60-day maximum password lifetime, this is a finding.
Fix: F-60003r2_fix
Configure the network device to enforce a 60-day maximum password lifetime.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- SRG-APP-000175-NDM-000262
- Vuln IDs
-
- V-55141
- Rule IDs
-
- SV-69387r2_rule
Checks: C-55761r2_chk
When PKI-based authentication is used, verify the network device accepts only certificates issued by a DoD-approved Certificate Authority. Determine if a CA trust point has been configured. The CA trust point will contain the URL for the CA governing the network device. Verify this is a DoD or DoD-approved CA. This requirement may be verified by configuration review or validated test results. If PKI-based authentication is used and the network device accepts certificates issued by other Certificate Authorities other than a DoD-approved Certificate Authority, this is a finding.
Fix: F-60005r2_fix
Configure the network device to accept only certificates issued by a DoD-approved Certificate Authority.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-NDM-000230
- Vuln IDs
-
- V-55143
- Rule IDs
-
- SV-69389r1_rule
Checks: C-55763r1_chk
Determine if the network device generates audit records containing information that establishes the identity of any individual or process associated with the event. This requirement may be verified by demonstration or validated test results. If the network device does not generate audit records containing information that establishes the identity of any individual or process associated with the event, this is a finding.
Fix: F-60007r1_fix
Configure the network device to generate audit records containing information that establishes the identity of any individual or process associated with the event.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-NDM-000263
- Vuln IDs
-
- V-55145
- Rule IDs
-
- SV-69391r1_rule
Checks: C-55765r1_chk
Determine if the network device maps the authenticated identity to the user account for PKI-based authentication. This requirement may be verified by configuration review or validated test results. If the network device does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.
Fix: F-60009r1_fix
Configure the network device to map the authenticated identity to the user account for PKI-based authentication.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-NDM-000231
- Vuln IDs
-
- V-55147
- Rule IDs
-
- SV-69393r1_rule
Checks: C-55767r1_chk
Determine if the network device generates audit records containing the full-text recording of privileged commands. If such audit records are not being generated, this is a finding.
Fix: F-60011r1_fix
Configure the network device to generate audit records containing the full-text recording of privileged commands.
- RMF Control
- IA-6
- Severity
- H
- CCI
- CCI-000206
- Version
- SRG-APP-000178-NDM-000264
- Vuln IDs
-
- V-55149
- Rule IDs
-
- SV-69395r2_rule
Checks: C-55769r1_chk
Determine if the network device obscures feedback of authentication information during the authentication process. This requirement may be verified by demonstration. If the network device does not obscure feedback of authentication information during the authentication process, this is a finding.
Fix: F-60013r1_fix
Configure the network device to obscure feedback of authentication information during the authentication process.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-NDM-000232
- Vuln IDs
-
- V-55151
- Rule IDs
-
- SV-69397r2_rule
Checks: C-55771r2_chk
Determine if the network device is configured to alert the ISSO and SA (at a minimum) in the event of an audit processing failure. This requirement can be met by a central audit server if the network device is configured to send audit logs to that audit server. If the ISSO and SA are not being alerted in the event of an audit processing failure, this is a finding.
Fix: F-60015r2_fix
Configure the network device to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000179-NDM-000265
- Vuln IDs
-
- V-55153
- Rule IDs
-
- SV-69399r4_rule
Checks: C-55773r3_chk
Determine if the network device uses FIPS 140-2 approved algorithms for authentication to a cryptographic module. If the network device is not configured to use a FIPS-approved authentication algorithm to a cryptographic module, this is a finding.
Fix: F-60017r2_fix
Configure the network device to use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000879
- Version
- SRG-APP-000186-NDM-000266
- Vuln IDs
-
- V-55155
- Rule IDs
-
- SV-69401r1_rule
Checks: C-55777r1_chk
Determine if the network device terminates all sessions and network connections when nonlocal device maintenance is completed. This requirement may be verified by demonstration or validated test results. If the network device does not terminate all sessions and network connections when nonlocal device maintenance is complete, this is a finding.
Fix: F-60021r1_fix
Configure the network device to terminate all sessions and network connections when nonlocal device maintenance is completed.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-NDM-000233
- Vuln IDs
-
- V-55157
- Rule IDs
-
- SV-69403r2_rule
Checks: C-55775r2_chk
Determine if the network device shuts down by default upon audit failure. When availability is an overriding concern, responses described in the vulnerability discussion must be used. These may be verified by demonstration, validated test results, or TTPs. If the network device does not shut down by default upon audit failure or, when availability is an overriding concern, and described responses in the vulnerability discussion are not performed, this is a finding.
Fix: F-60019r2_fix
Configure the network device to shut down by default upon audit failure or, when availability is an overriding concern, perform responses described in the vulnerability discussion.
- RMF Control
- SC-10
- Severity
- H
- CCI
- CCI-001133
- Version
- SRG-APP-000190-NDM-000267
- Vuln IDs
-
- V-55159
- Rule IDs
-
- SV-69405r2_rule
Checks: C-55779r1_chk
Determine if the network device terminates the connection associated with a device management session at the end of the session or after 10 minutes of inactivity. This requirement may be verified by demonstration or configuration review. If the network device does not terminate the connection associated with a device management session at the end of the session or after 10 minutes of inactivity, this is a finding.
Fix: F-60023r1_fix
Configure the network device to terminate the connection associated with a device management session at the end of the session or after 10 minutes of inactivity.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-APP-000220-NDM-000268
- Vuln IDs
-
- V-55161
- Rule IDs
-
- SV-69407r1_rule
Checks: C-55783r1_chk
If the network device uses a web interface for device management, determine if the network device invalidates session identifiers upon administrator logout or other session termination. This requirement may be verified by validated test results. If the network device does not invalidate session identifiers upon administrator logout or other session termination, this is a finding.
Fix: F-60027r1_fix
Configure the network device to invalidate session identifiers upon administrator logout or other session termination.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-NDM-000269
- Vuln IDs
-
- V-55163
- Rule IDs
-
- SV-69409r1_rule
Checks: C-55785r1_chk
If the network device uses a web interface for device management, determine if it recognizes only system-generated session identifiers. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device recognizes other session identifiers than the system-generated ones, this is a finding.
Fix: F-60029r1_fix
Configure the network device to recognize only system-generated session identifiers.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-NDM-000234
- Vuln IDs
-
- V-55165
- Rule IDs
-
- SV-69411r1_rule
Checks: C-55781r1_chk
Determine if the network device uses internal system clocks to generate time stamps for audit records. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not use internal system clocks to generate time stamps for audit records, this is a finding.
Fix: F-60025r1_fix
Configure the network device to use internal system clocks to generate time stamps for audit records.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-NDM-000270
- Vuln IDs
-
- V-55167
- Rule IDs
-
- SV-69413r1_rule
Checks: C-55787r1_chk
If the network device uses a web interface for device management, determine if it generates unique session identifiers using a FIPS 140-2 approved random number generator. This requirement may be verified by validated NIST certification and vendor documentation. If the network device does not use unique session identifiers for its web interface for device management, this is a finding.
Fix: F-60031r1_fix
Configure the network device to generate unique session identifiers using a FIPS 140-2 approved random number generator.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-001199
- Version
- SRG-APP-000231-NDM-000271
- Vuln IDs
-
- V-55171
- Rule IDs
-
- SV-69417r3_rule
Checks: C-55791r2_chk
List the contents of the network device’s local storage, including any drives supporting removable media (such as flash drives or CDs) and check the file permissions of all files on those drives. If any files allow read or write access by accounts not specifically authorized access or by non-privileged accounts, this is a finding.
Fix: F-60035r2_fix
Set the file permissions on files on the network device or on removable media used by the device so that only authorized administrators can read or change their contents.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-NDM-000236
- Vuln IDs
-
- V-55173
- Rule IDs
-
- SV-69419r1_rule
Checks: C-55793r1_chk
Determine if the network device protects audit information from any type of unauthorized modification with such methods as ensuring log files receive the proper file system permissions, limiting log data locations and leveraging user permissions and roles to identify the user accessing the data and the corresponding rights that the user enjoys. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not protect audit information from unauthorized modification, this is a finding.
Fix: F-60037r1_fix
Configure the network device to protect audit information from unauthorized modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-APP-000234-NDM-000272
- Vuln IDs
-
- V-55175
- Rule IDs
-
- SV-69421r4_rule
Checks: C-55795r6_chk
If the use of emergency administrator accounts is prohibited by the organization, this is not a finding. If the system does not have the capability to remove or disable accounts based on account type or cannot be configured to remove or disable accounts automatically, this is not a finding. Interview site personnel and ask if emergency administrator accounts are allowed to be configured locally on the network device. Review the network device configuration to determine if it is configured to automatically disable or remove emergency administrator accounts. If an emergency administrator account type has been configured to be automatically removed or disabled, this is a finding.
Fix: F-60039r4_fix
Remove the expiration date or other method which is used to automatically disable or remove emergency administrator accounts which are configured on the network device.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-NDM-000237
- Vuln IDs
-
- V-55179
- Rule IDs
-
- SV-69425r1_rule
Checks: C-55799r1_chk
Determine if the network device protects audit information from any type of unauthorized deletion with such methods as ensuring log files receive the proper file system permissions utilizing file system protections, restricting access to log data and backing up log data to ensure log data is retained, and leveraging user permissions and roles to identify the user accessing the data and the corresponding rights the user enjoys. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not protect audit information from unauthorized deletion, this is a finding.
Fix: F-60043r1_fix
Configure the network device to protect audit information from unauthorized deletion.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000268-NDM-000274
- Vuln IDs
-
- V-55181
- Rule IDs
-
- SV-69427r1_rule
Checks: C-55801r1_chk
Determine if the network device activates a system alert message, sends an alarm, and/or automatically shuts down when a component failure is detected. This requirement may be verified by demonstration or configuration review. If the network device does not activate a system alert message, send an alarm, or automatically shut down when a component failure is detected, this is a finding.
Fix: F-60045r1_fix
Configure the network device to activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-NDM-000238
- Vuln IDs
-
- V-55183
- Rule IDs
-
- SV-69429r1_rule
Checks: C-55803r1_chk
If the network device provides audit tools, check the device to determine if it protects audit tools from unauthorized access. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not protect its audit tools from unauthorized access, this is a finding.
Fix: F-60047r1_fix
Configure the network device to protect audit tools from unauthorized access.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001683
- Version
- SRG-APP-000291-NDM-000275
- Vuln IDs
-
- V-55185
- Rule IDs
-
- SV-69431r1_rule
Checks: C-55805r1_chk
Determine if the network device generates alerts that can be forwarded to the administrators and IAO when accounts are created. This requirement may be verified by demonstration or configuration review. If the network device is configured to use an authentication server which would perform this function, this is not a finding. If alerts are not generated when accounts are created and forwarded to the administrators and IAO, this is a finding.
Fix: F-60049r1_fix
Configure the network device or its associated authentication server to send a notification message to the administrators and IAO when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001684
- Version
- SRG-APP-000292-NDM-000276
- Vuln IDs
-
- V-55187
- Rule IDs
-
- SV-69433r2_rule
Checks: C-55807r2_chk
Determine if the network device generates alerts that can be forwarded to the administrators and ISSO when accounts are modified. This requirement may be verified by demonstration or configuration review. If alerts are not generated when accounts are modified and forwarded to the administrators and ISSO, this is a finding.
Fix: F-60051r2_fix
Configure the network device to send a notification message to the administrators and ISSO when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001685
- Version
- SRG-APP-000293-NDM-000277
- Vuln IDs
-
- V-55189
- Rule IDs
-
- SV-69435r1_rule
Checks: C-55811r1_chk
Determine if the network device generates alerts that can be forwarded to the administrators and IAO when accounts are disabled. This requirement may be verified by demonstration or configuration review. If the network device is configured to use an authentication server which would perform this function, this is not a finding. If alerts are not generated when accounts are disabled and forwarded to the administrators and IAO, this is a finding.
Fix: F-60055r1_fix
Configure the network device or its associated authentication server to send a notification message to the administrators and IAO when accounts are disabled.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-NDM-000239
- Vuln IDs
-
- V-55191
- Rule IDs
-
- SV-69437r1_rule
Checks: C-55809r1_chk
If the network device provides audit tools, check the device to determine if it protects audit tools from unauthorized modification. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not protect its audit tools from unauthorized modification, this is a finding.
Fix: F-60053r1_fix
Configure the network device to protect audit tools from unauthorized modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001686
- Version
- SRG-APP-000294-NDM-000278
- Vuln IDs
-
- V-55193
- Rule IDs
-
- SV-69439r1_rule
Checks: C-55813r1_chk
Determine if the network device generates alerts that can be forwarded to the administrators and IAO when accounts are removed. This requirement may be verified by demonstration or configuration review. If the network device is configured to use an authentication server which would perform this function, this is not a finding. If alerts are not generated when accounts are removed and forwarded to the administrators and IAO, this is a finding.
Fix: F-60057r1_fix
Configure the network device or its associated authentication server to send a notification message to the administrators and IAO when accounts are removed.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-NDM-000280
- Vuln IDs
-
- V-55197
- Rule IDs
-
- SV-69443r1_rule
Checks: C-55817r1_chk
Review the network device configuration to determine if it provides a logout capability for administrator-initiated communication sessions. This requirement may be verified by demonstration. If the network device does not provide a logout capability for these sessions, this is a finding.
Fix: F-60061r1_fix
Configure the network device to provide a logout capability for administrator-initiated communication sessions.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-APP-000297-NDM-000281
- Vuln IDs
-
- V-55199
- Rule IDs
-
- SV-69445r2_rule
Checks: C-55819r2_chk
This requirement may be verified by demonstration. If an explicit logoff message is not displayed, or provides clear evidence that the session has been terminated, this is a finding.
Fix: F-60063r2_fix
Configure the network device to display an explicit logoff message to administrators indicating the reliable termination of authenticated communications sessions. This may be a capability the device is inherently capable of.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002142
- Version
- SRG-APP-000317-NDM-000282
- Vuln IDs
-
- V-55201
- Rule IDs
-
- SV-69447r1_rule
Checks: C-55821r1_chk
Determine if the network device terminates shared/group account credentials when members leave the group. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. This requirement is not applicable if the device does not support shared/group credentials. If the network device does not terminate shared/group credentials when members leave the group, this is a finding.
Fix: F-60065r1_fix
Configure the network device to terminate shared/group account credentials when members leave the group.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-APP-000319-NDM-000283
- Vuln IDs
-
- V-55203
- Rule IDs
-
- SV-69449r1_rule
Checks: C-55823r1_chk
Determine if the network device automatically audits account enabling actions. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account enabling actions are not automatically audited, this is a finding.
Fix: F-60067r1_fix
Configure the network device or its associated authentication server to automatically audit account enabling actions.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-NDM-000240
- Vuln IDs
-
- V-55205
- Rule IDs
-
- SV-69451r1_rule
Checks: C-55825r1_chk
If the network device provides audit tools, check to see that the network device protects audit tools from unauthorized deletion. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not protect its audit tools from unauthorized deletion, this is a finding.
Fix: F-60069r1_fix
Configure the network device to protect audit tools from unauthorized deletion.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- SRG-APP-000320-NDM-000284
- Vuln IDs
-
- V-55207
- Rule IDs
-
- SV-69453r2_rule
Checks: C-55827r1_chk
Determine if the network device generates an immediate alert for account enabling actions. This requirement may be verified by demonstration, configuration review or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not generate an immediate alert for account enabling actions, this is a finding.
Fix: F-60071r1_fix
Configure the network device or its associated authentication server to generate an immediate alert for account enabling actions.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- SRG-APP-000125-NDM-000241
- Vuln IDs
-
- V-55209
- Rule IDs
-
- SV-69455r1_rule
Checks: C-55831r1_chk
Determine if the network device backs up audit records at least every seven days onto a different system or system component than the system or component being audited. This requirement may be verified by configuration review. This requirement can be met by use of a syslog/audit log server if the device is configured to send logs to that server. Backup requirements would be levied on the target server but are not a part of this check. If the network device does not back up audit records at least every seven days onto a different system or system component than the system or component being audited, this is a finding.
Fix: F-60075r1_fix
Configure the network device to back up audit records at least every seven days onto a different system or system component than the system or component being audited.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000325-NDM-000285
- Vuln IDs
-
- V-55211
- Rule IDs
-
- SV-69457r2_rule
Checks: C-55829r2_chk
Review the device configuration to determine if it uses an IETF Internet standard authentication protocol. Examples include RADIUS, EAP, LDAP, and TACACS+. If it is not configured to use an IETF Internet standard authentication protocol, this is a finding.
Fix: F-60073r2_fix
Configure the network device to use an IETF Internet standard authentication protocol.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001350
- Version
- SRG-APP-000126-NDM-000242
- Vuln IDs
-
- V-55213
- Rule IDs
-
- SV-69459r1_rule
Checks: C-55833r1_chk
Determine if the network device uses cryptographic mechanisms to protect the integrity of audit information. This requirement may be verified by configuration review or validated test results. If the network device does not use cryptographic mechanisms to protect the integrity of audit information, this is a finding.
Fix: F-60077r1_fix
Configure the network device to use cryptographic mechanisms to protect the integrity of audit information.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-APP-000328-NDM-000286
- Vuln IDs
-
- V-55215
- Rule IDs
-
- SV-69461r1_rule
Checks: C-55835r1_chk
Check the network device to determine if organization-defined discretionary access control policies are enforced over defined subjects and objects. If it does not use discretionary access control, this is not a finding. If organization-defined discretionary access control policies are not enforced over defined subjects and objects, this is a finding.
Fix: F-60079r1_fix
Configure the network device to enforce organization-defined discretionary access control policies over defined subjects and objects.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000329-NDM-000287
- Vuln IDs
-
- V-55217
- Rule IDs
-
- SV-69463r1_rule
Checks: C-55837r1_chk
Determine if the network device enforces role-based access control policy over defined subjects and objects. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If role-based access control policy is not enforced over defined subjects and objects, this is a finding.
Fix: F-60081r1_fix
Configure the network device or its associated authentication server to enforce role-based access control policy over defined subjects and objects.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-NDM-000243
- Vuln IDs
-
- V-55219
- Rule IDs
-
- SV-69465r1_rule
Checks: C-55839r1_chk
Determine if the network device prevents the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization, this is a finding.
Fix: F-60083r1_fix
Configure the network device to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- SRG-APP-000340-NDM-000288
- Vuln IDs
-
- V-55221
- Rule IDs
-
- SV-69467r2_rule
Checks: C-55841r1_chk
Determine if the network device prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not prevent non-privileged users from executing privileged functions, this is a finding.
Fix: F-60085r1_fix
Configure the network device to prevent non-privileged users from executing privileged functions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000373-NDM-000298
- Vuln IDs
-
- V-55231
- Rule IDs
-
- SV-69477r2_rule
Checks: C-55851r2_chk
Determine if the network device is configured to synchronize internal information system clocks with the primary and secondary time sources. If the network device is not configured to synchronize internal information system clocks with the primary and secondary time sources, this is a finding.
Fix: F-60095r2_fix
Configure the network device to synchronize internal information system clocks with the primary and secondary time sources.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-NDM-000299
- Vuln IDs
-
- V-55233
- Rule IDs
-
- SV-69479r1_rule
Checks: C-55853r1_chk
Determine if the network device records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). This requirement may be verified by demonstration or configuration review. If the network device does not record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT), this is a finding.
Fix: F-60097r1_fix
Configure the network device to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-NDM-000300
- Vuln IDs
-
- V-55235
- Rule IDs
-
- SV-69481r1_rule
Checks: C-55855r1_chk
Determine if the network device records time stamps for audit records that meet a granularity of one second for a minimum degree of precision. This requirement may be verified by demonstration or configuration. If the network device does not record time stamps for audit records that meet a granularity of one second for a minimum degree of precision, this is a finding.
Fix: F-60099r1_fix
Configure the network device to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001811
- Version
- SRG-APP-000377-NDM-000301
- Vuln IDs
-
- V-55237
- Rule IDs
-
- SV-69483r2_rule
Checks: C-55857r1_chk
Determine if the network device generates an alert when the unauthorized installation of software is detected. This requirement may be verified by demonstration or configuration review. The management/audit server that the network device sends alerts to would typically perform the function of sending these alerts to specific individuals. If the network device does not generate an alert when the unauthorized installation of software is detected, this is a finding.
Fix: F-60101r1_fix
Configure the network device to generate an alert when the unauthorized installation of software is detected.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- SRG-APP-000378-NDM-000302
- Vuln IDs
-
- V-55239
- Rule IDs
-
- SV-69485r1_rule
Checks: C-55859r1_chk
Determine if the network device prohibits installation of software without explicit privileged status. This requirement may be verified by demonstration or configuration review. If installation of software is not prohibited without explicit privileged status, this is a finding.
Fix: F-60103r1_fix
Configure the network device to prohibit installation of software without explicit privileged status.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-NDM-000304
- Vuln IDs
-
- V-55243
- Rule IDs
-
- SV-69489r1_rule
Checks: C-55863r1_chk
Determine if the network device enforces access restrictions associated with changes to device configuration. If the network device does not enforce such access restrictions, this is a finding.
Fix: F-60107r1_fix
Configure the network device to enforce access restrictions associated with changes to device configuration.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- SRG-APP-000381-NDM-000305
- Vuln IDs
-
- V-55245
- Rule IDs
-
- SV-69491r1_rule
Checks: C-55865r1_chk
Determine if the network device audits the enforcement actions used to restrict access associated with changes to the device. This requirement may be verified by demonstration, configuration review or validated test results. If the network device does not audit the enforcement actions used to restrict access associated with changes to the device, this is a finding.
Fix: F-60109r1_fix
Configure the network device to audit the enforcement actions used to restrict access associated with changes to the device.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-APP-000389-NDM-000306
- Vuln IDs
-
- V-55247
- Rule IDs
-
- SV-69493r1_rule
Checks: C-55867r1_chk
Determine if the network device requires users to re-authenticate when privilege escalation or role changes occur. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If users are not required to re-authenticate when privilege escalation or role changes occur, this is a finding.
Fix: F-60111r1_fix
Configure the network device or its associated authentication server to require users to re-authenticate when privilege escalation or role changes occur.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-NDM-000308
- Vuln IDs
-
- V-55251
- Rule IDs
-
- SV-69497r1_rule
Checks: C-55871r1_chk
Determine if the network device accepts PIV credentials. This requirement may be verified by demonstration. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not accept PIV credentials, this is a finding.
Fix: F-60115r1_fix
Configure the network device or its associated authentication server to accept PIV credentials.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-APP-000392-NDM-000309
- Vuln IDs
-
- V-55253
- Rule IDs
-
- SV-69499r1_rule
Checks: C-55873r1_chk
Determine if the network device electronically verifies PIV credentials. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not electronically verify PIV credentials, this is a finding.
Fix: F-60117r1_fix
Configure the network device or its associated authentication server to electronically verify PIV credentials.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-APP-000395-NDM-000310
- Vuln IDs
-
- V-55255
- Rule IDs
-
- SV-69501r3_rule
Checks: C-55875r3_chk
Review the network device configuration to verify SNMP messages are authenticated using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC). If the network device is not configured to authenticate SNMP messages using a FIPS-validated HMAC, this is a finding.
Fix: F-60119r3_fix
Configure the network device to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000396-NDM-000311
- Vuln IDs
-
- V-55257
- Rule IDs
-
- SV-69503r1_rule
Checks: C-55877r1_chk
Determine if the network device dynamically manages identifiers. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If identifiers are not dynamically managed, this is a finding.
Fix: F-60121r1_fix
Configure the network device or its associated authentication server to dynamically manage identifiers.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-APP-000397-NDM-000312
- Vuln IDs
-
- V-55259
- Rule IDs
-
- SV-69505r1_rule
Checks: C-55879r1_chk
Determine if the network device allows the use of a temporary password for system logons with an immediate change to a permanent password. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the use of a temporary password for system logons with an immediate change to a permanent password is not allowed, this is a finding.
Fix: F-60123r1_fix
Configure the network device or its associated authentication server to allow the use of a temporary password for system logons with an immediate change to a permanent password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-NDM-000313
- Vuln IDs
-
- V-55261
- Rule IDs
-
- SV-69507r1_rule
Checks: C-55881r1_chk
Review the network device configuration to determine if the network device or its associated authentication server prohibits the use of cached authenticators after an organization-defined time period. If cached authenticators are used after an organization-defined time period, this is a finding.
Fix: F-60125r1_fix
Configure the network device or its associated authentication server to prohibit the use of cached authenticators after an organization-defined time period.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000408-NDM-000314
- Vuln IDs
-
- V-55263
- Rule IDs
-
- SV-69509r1_rule
Checks: C-55883r1_chk
Determine if the network device restricts the use of maintenance functions to authorized personnel only. If other personnel can use maintenance functions on the network device, this is a finding.
Fix: F-60127r1_fix
Configure the network device to restrict use of maintenance functions to authorized personnel only.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-002890
- Version
- SRG-APP-000411-NDM-000330
- Vuln IDs
-
- V-55265
- Rule IDs
-
- SV-69511r3_rule
Checks: C-55885r2_chk
Verify the network device uses FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications. If the network device does not use FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications, this is a finding.
Fix: F-60129r2_fix
Configure the network device to use FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-003123
- Version
- SRG-APP-000412-NDM-000331
- Vuln IDs
-
- V-55267
- Rule IDs
-
- SV-69513r3_rule
Checks: C-55887r2_chk
Review the network device configuration to determine if cryptographic mechanisms are implemented using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions If the network device is not configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions using a FIPS 140-2 approved algorithm, this is a finding.
Fix: F-60131r2_fix
Configure the network device to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions using a FIPS 140-2 approved algorithm.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-NDM-000315
- Vuln IDs
-
- V-55269
- Rule IDs
-
- SV-69515r2_rule
Checks: C-55889r1_chk
Determine if the network device protects against or limits the effects of all known types of DoS attacks by employing organization-defined security safeguards. If the network device does not protect against or limit the effects of all known types of DoS attacks by employing organization-defined security safeguards, this is a finding.
Fix: F-60133r1_fix
Configure the network device to protect against or limit the effects of all known types of DoS attacks by employing organization-defined security safeguards.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000491-NDM-000316
- Vuln IDs
-
- V-55271
- Rule IDs
-
- SV-69517r1_rule
Checks: C-55891r1_chk
Check the network device to determine if organization-defined mandatory access control policies are enforced over all subjects and objects. If it does not use mandatory access control, this is not a finding. If organization-defined mandatory access control policies are not enforced over all subjects and objects, this is a finding.
Fix: F-60135r1_fix
Configure the network device to enforce organization-defined mandatory access control policies over all subjects and objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-NDM-000318
- Vuln IDs
-
- V-55273
- Rule IDs
-
- SV-69519r1_rule
Checks: C-55893r1_chk
Determine if the network device generates audit records when successful/unsuccessful attempts to modify administrator privileges occur. If the network device does not generate audit records when successful/unsuccessful attempts to modify administrator privileges occur, this is a finding.
Fix: F-60137r1_fix
Configure the network device to generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-NDM-000319
- Vuln IDs
-
- V-55275
- Rule IDs
-
- SV-69521r1_rule
Checks: C-55895r1_chk
Determine if the network device generates audit records when successful/unsuccessful attempts to delete administrator privileges occur. If the network device does not generate audit records when successful/unsuccessful attempts to delete administrator privileges occur, this is a finding.
Fix: F-60139r1_fix
Configure the network device to generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-NDM-000320
- Vuln IDs
-
- V-55277
- Rule IDs
-
- SV-69523r1_rule
Checks: C-55897r1_chk
Determine if the network device generates audit records when successful/unsuccessful logon attempts occur. If it does not generate audit records when successful/unsuccessful logon attempts occur, this is a finding.
Fix: F-60141r1_fix
Configure the network device to generate audit records when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-NDM-000321
- Vuln IDs
-
- V-55279
- Rule IDs
-
- SV-69525r1_rule
Checks: C-55899r1_chk
Determine if the network device generates audit records for privileged activities or other system-level access. If the network device does not generate audit records for privileged activities or other system-level access, this is a finding.
Fix: F-60143r1_fix
Configure the network device to generate audit records for privileged activities or other system-level access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-NDM-000322
- Vuln IDs
-
- V-55281
- Rule IDs
-
- SV-69527r1_rule
Checks: C-55901r1_chk
Determine if the network device generates audit records showing starting and ending time for administrator access to the system. If the network device does not generate audit records showing starting and ending time for administrator access to the system, this is a finding.
Fix: F-60145r1_fix
Configure the network device to generate audit records showing starting and ending time for administrator access to the system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-NDM-000323
- Vuln IDs
-
- V-55283
- Rule IDs
-
- SV-69529r1_rule
Checks: C-55903r1_chk
Determine if the network device generates audit records when concurrent logons from different workstations occur. If the network device does not generate audit records when concurrent logons from different workstations occur, this is a finding.
Fix: F-60147r1_fix
Configure the network device to generate audit records when concurrent logons from different workstations occur.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000515-NDM-000325
- Vuln IDs
-
- V-55287
- Rule IDs
-
- SV-69533r1_rule
Checks: C-55907r1_chk
Check the network device configuration to determine if the device off-loads audit records onto a different system or media than the system being audited. If the device does not off-load audit records onto a different system or media, this is a finding.
Fix: F-60151r1_fix
Configure the network device to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000332
- Vuln IDs
-
- V-55291
- Rule IDs
-
- SV-69537r1_rule
Checks: C-55911r1_chk
Determine if the network device notifies the administrator of the number of successful login attempts occurring during an organization-defined time period. This can be accomplished by connecting to the network device and noting if the number of successful login attempts is displayed. If the administrator is not notified of the number of successful login attempts occurring during an organization-defined time period, this is a finding.
Fix: F-60155r1_fix
Configure the network device to notify the administrator of the number of successful login attempts occurring during an organization-defined time period.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000333
- Vuln IDs
-
- V-55293
- Rule IDs
-
- SV-69539r1_rule
Checks: C-55913r1_chk
Determine if the network device uses automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g. CTOs) and IAW with CJCSM 6510.01B. If the network device does not use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g. CTOs) and IAW with CJCSM 6510.01B, this is a finding.
Fix: F-60157r1_fix
Configure the network device to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g. CTOs) and IAW with CJCSM 6510.01B.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000516-NDM-000334
- Vuln IDs
-
- V-55295
- Rule IDs
-
- SV-69541r3_rule
Checks: C-55915r2_chk
Determine if the network device generates audit log events for a locally developed list of auditable events. If the network device is not configured to generate audit log events for a locally developed list of auditable events, this is a finding.
Fix: F-60159r3_fix
Configure the network device to generate audit log events for a locally developed list of auditable events.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-000345
- Version
- SRG-APP-000516-NDM-000335
- Vuln IDs
-
- V-55297
- Rule IDs
-
- SV-69543r1_rule
Checks: C-55917r1_chk
Check the network device to determine if only authorized administrators have permissions for changes, deletions and updates on the network device. Inspect the maintenance log to verify changes are being made only by the system administrators. If unauthorized users are allowed to change the hardware or software, this is a finding.
Fix: F-60161r1_fix
Configure the network device to enforce access restrictions associated with changes to the system components.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000336
- Vuln IDs
-
- V-55299
- Rule IDs
-
- SV-69545r4_rule
Checks: C-55919r5_chk
Review the network device configuration to verify the device is configured to use an authentication server as primary source for authentication.
Fix: F-60163r4_fix
Configure the network device to use an authentication server as the primary source for authentication.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000337
- Vuln IDs
-
- V-55301
- Rule IDs
-
- SV-69547r1_rule
Checks: C-55921r1_chk
Review the network device configuration to determine if it employs automated mechanisms to centrally apply authentication settings. If authentication settings are not applied centrally using automated mechanisms, this is a finding.
Fix: F-60165r1_fix
Configure the network device to employ automated mechanisms to centrally apply authentication settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000338
- Vuln IDs
-
- V-55303
- Rule IDs
-
- SV-69549r1_rule
Checks: C-55923r1_chk
Review the network device configuration to determine if it employs automated mechanisms to centrally verify authentication settings. If authentication settings are not verified centrally using automated mechanisms, this is a finding.
Fix: F-60167r1_fix
Configure the network device to employ automated mechanisms to centrally verify authentication settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000339
- Vuln IDs
-
- V-55305
- Rule IDs
-
- SV-69551r1_rule
Checks: C-55925r1_chk
Determine if the network device employs automated mechanisms to detect the addition of any unauthorized components or devices. If the network device does not employ automated mechanisms to detect the addition of unauthorized components or devices, this is a finding.
Fix: F-60169r1_fix
Configure the network device to employ automated mechanisms to detect the addition of unauthorized components or devices.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000340
- Vuln IDs
-
- V-55307
- Rule IDs
-
- SV-69553r2_rule
Checks: C-55927r3_chk
Review the network device configuration to determine if the device is configured to conduct backups of system-level information contained in the information system when changes occur. If the network device is not configured to conduct backups of system-level data when changes occur, this is a finding.
Fix: F-60171r2_fix
Configure the network device to conduct backups of system-level information contained in the information system when changes occur.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000341
- Vuln IDs
-
- V-55309
- Rule IDs
-
- SV-69555r1_rule
Checks: C-55929r1_chk
Review the network device backup configuration to determine if the network device backs up the information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner. If the network device does not backup the information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner, this is a finding.
Fix: F-60173r1_fix
Configure the network device to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000342
- Vuln IDs
-
- V-55311
- Rule IDs
-
- SV-69557r1_rule
Checks: C-55931r1_chk
Determine if the network device employs automated mechanisms to assist in the tracking of security incidents. If such automated mechanisms are not employed, this is a finding.
Fix: F-60175r1_fix
Configure the network device to employ automated mechanisms to assist in the tracking of security incidents.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000344
- Vuln IDs
-
- V-55313
- Rule IDs
-
- SV-69559r1_rule
Checks: C-55933r1_chk
Determine if the network device obtains public key certificates from an appropriate certificate policy through an approved service provider. If the network device does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Fix: F-60177r1_fix
Configure the network device to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-NDM-000244
- Vuln IDs
-
- V-55315
- Rule IDs
-
- SV-69561r1_rule
Checks: C-55937r1_chk
Determine if the network device limits privileges to change the software resident within software libraries. If it does not limit privileges to change the software resident within software libraries, this is a finding.
Fix: F-60181r1_fix
Configure the network device to limit privileges to change the software resident within software libraries.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-APP-000080-NDM-000345
- Vuln IDs
-
- V-63997
- Rule IDs
-
- SV-78487r1_rule
Checks: C-64749r1_chk
Review the configuration of the network device to determine if the vendor default password is present. This may involve showing the passwords configured on the device in the clear.
Fix: F-69925r1_fix
Remove any vendor default passwords from the network device configuration.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001358
- Version
- SRG-APP-000148-NDM-000346
- Vuln IDs
-
- V-64001
- Rule IDs
-
- SV-78491r3_rule
Checks: C-64753r3_chk
Review the network device configuration to determine if an account of last resort is configured. Verify default admin and other vendor-provided accounts are disabled, removed, or renamed where possible. Verify the username and password for the account of last resort is contained within a sealed envelope and kept in a safe. If one local account does not exist for use as the account of last resort, this is a finding.
Fix: F-69931r2_fix
Configure the device to only allow one local account for use as the account of last resort.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-APP-000395-NDM-000347
- Vuln IDs
-
- V-68747
- Rule IDs
-
- SV-83339r2_rule
Checks: C-69297r1_chk
Review the network device configuration to determine if the network device authenticates NTP endpoints before establishing a local, remote, or network connection using authentication that is cryptographically based. If the network device does not authenticate Network Time Protocol sources using authentication that is cryptographically based, this is a finding.
Fix: F-74915r1_fix
Configure the network device to authenticate Network Time Protocol sources using authentication that is cryptographically based.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-NDM-000350
- Vuln IDs
-
- V-80967
- Rule IDs
-
- SV-95679r1_rule
Checks: C-80711r1_chk
When PKI-based authentication is used, verify the network device does not accept revoked certificates. Determine if the CA trust point defined on the network device references a CRL and that revocation check has been enabled. An alternate mechanism for checking the validity of a certificate is the use of the Online Certificate Status Protocol (OCSP). Unlike CRLs, which provide only periodic certificate status checks, OCSP can provide timely information regarding the status of a certificate. This requirement may be verified by configuration review or validated test results. If PKI-based authentication is used and the network device accepts revoked certificates, this is a finding.
Fix: F-87827r1_fix
Configure the network device to not accept revoked certificates.