Network Device Management Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1 ✎ 3
Comparison against the immediately-prior release (V2R4). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-68747 Medium The network device must authenticate Network Time Protocol sources using authentication that is cryptographically based.
Content changes 3
- V-55113 Medium description The network device must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
- V-55135 Medium description The network device must enforce 24 hours/1 day as the minimum password lifetime.
- V-55255 Medium descriptioncheckfix The network device must authenticate network management SNMP endpoints before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-NDM-000200
- Vuln IDs
-
- V-55027
- Rule IDs
-
- SV-69273r1_rule
Checks: C-55649r1_chk
Review the network device configuration to see if the device limits the number of concurrent sessions to an organization-defined number for all administrator accounts and/or administrator account types or is configured to use an authentication server which would perform this function. If neither of these configurations is present, this is a finding.
Fix: F-59893r1_fix
Configure the network device either to limit the number of concurrent sessions to an organization-defined number for all administrator accounts and/or administrator account types or to use an authentication server which would perform this function.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SRG-APP-000002-NDM-000201
- Vuln IDs
-
- V-55029
- Rule IDs
-
- SV-69275r1_rule
Checks: C-55651r1_chk
Review the network device configuration to see if the device conceals information previously visible on the display with a publicly viewable image during the session lock. This can be demonstrated by the network administrator. If previously visible information is not concealed with a publicly viewable image by the session lock, this is a finding.
Fix: F-59895r1_fix
Configure the network device to conceal information previously visible on the display with a publicly viewable image during the session lock.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-APP-000003-NDM-000202
- Vuln IDs
-
- V-55031
- Rule IDs
-
- SV-69277r1_rule
Checks: C-55653r1_chk
Review the network device configuration to see if it initiates a session lock after a 15-minute period of inactivity. This may be verified by configuration check or demonstration. If a session lock is not initiated after a 15-minute period of inactivity, this is a finding.
Fix: F-59897r1_fix
Configure the network device to initiate a session lock after a 15-minute period of inactivity.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000058
- Version
- SRG-APP-000004-NDM-000203
- Vuln IDs
-
- V-55033
- Rule IDs
-
- SV-69279r2_rule
Checks: C-55655r2_chk
Directly observe the management application or the console; if an administrator cannot directly initiate a session lock from either the management application or the console, this is a finding.
Fix: F-59899r2_fix
This is an intrinsic capability of the client application or the console. Many terminal emulation clients implement this capability through software flow control or XOFF/XON flow control.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SRG-APP-000005-NDM-000204
- Vuln IDs
-
- V-55035
- Rule IDs
-
- SV-69281r1_rule
Checks: C-55657r1_chk
Review the network device configuration to determine if the device retains session lock until the administrator re-authenticates. This may be verified by configuration check, demonstration, or other validation test results. If the device does not require re-authentication before releasing the session lock, this is a finding.
Fix: F-59901r1_fix
Configure the network device to retain session lock until the administrator re-authenticates.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-APP-000023-NDM-000205
- Vuln IDs
-
- V-55037
- Rule IDs
-
- SV-69283r2_rule
Checks: C-55659r2_chk
Review the device configuration to determine if an authentication server is required to access the device and that there are two or more authentication servers defined. If fewer than two authentication servers are used, this is a finding.
Fix: F-59903r2_fix
Configure the network device to use an authentication server to access the device and define two or more authentication servers.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-APP-000024-NDM-000206
- Vuln IDs
-
- V-55039
- Rule IDs
-
- SV-69285r1_rule
Checks: C-55661r1_chk
Review the network device configuration to determine if it automatically disables or removes temporary accounts after 72 hours or is configured to use an authentication server that would perform this function. If the use of temporary accounts is prohibited, this is not a finding. If the network device or its associated authentication server does not automatically disable or remove temporary accounts after 72 hours, this is a finding.
Fix: F-59905r1_fix
Configure the network device or its associated authentication server to automatically disable or remove temporary accounts after 72 hours. An acceptable method would be to place an expiration date on the account upon creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- SRG-APP-000025-NDM-000207
- Vuln IDs
-
- V-55041
- Rule IDs
-
- SV-69287r1_rule
Checks: C-55663r1_chk
Review the network device configuration to determine if it automatically disables accounts after 35 days of inactivity or is configured to use an authentication server which would perform this function. If accounts are not automatically disabled after 35 days of inactivity, this is a finding.
Fix: F-59907r1_fix
Configure the network device or its associated authentication server to automatically disable accounts after 35 days of inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-NDM-000208
- Vuln IDs
-
- V-55043
- Rule IDs
-
- SV-69289r1_rule
Checks: C-55665r1_chk
Review the network device configuration to determine if it automatically audits account creation or is configured to use an authentication server which would perform this function. If account creation is not automatically audited, this is a finding.
Fix: F-59909r1_fix
Configure the network device or its associated authentication server to automatically audit the creation of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-NDM-000209
- Vuln IDs
-
- V-55045
- Rule IDs
-
- SV-69291r1_rule
Checks: C-55667r1_chk
Check the network device to determine if account modification actions are automatically audited. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account modification is not automatically audited, this is a finding.
Fix: F-59911r1_fix
Configure the network device or its associated authentication server to automatically audit the modification of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-NDM-000210
- Vuln IDs
-
- V-55047
- Rule IDs
-
- SV-69293r1_rule
Checks: C-55669r1_chk
Check the network device to determine if account disabling actions are automatically audited. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account disabling actions are not audited, this is a finding.
Fix: F-59913r1_fix
Configure the network device or its associated authentication server to automatically audit the disabling of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-NDM-000211
- Vuln IDs
-
- V-55049
- Rule IDs
-
- SV-69295r1_rule
Checks: C-55671r1_chk
Check the network device to determine if account removal actions are automatically audited. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account removal actions are not automatically audited, this is a finding.
Fix: F-59915r1_fix
Configure the network device or its associated authentication server to automatically audit the removal of accounts.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-NDM-000212
- Vuln IDs
-
- V-55051
- Rule IDs
-
- SV-69297r1_rule
Checks: C-55673r1_chk
Determine if the network device enforces the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level, this is a finding.
Fix: F-59917r1_fix
Configure the network device to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-APP-000038-NDM-000213
- Vuln IDs
-
- V-55053
- Rule IDs
-
- SV-69299r1_rule
Checks: C-55675r1_chk
Review the network device configuration to determine if it enforces approved authorizations for controlling the flow of management information within the network device based on information flow control policies. If it does not enforce these approved authorizations, this is a finding.
Fix: F-59919r1_fix
Configure the network device to enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-NDM-000214
- Vuln IDs
-
- V-55055
- Rule IDs
-
- SV-69301r1_rule
Checks: C-55677r1_chk
Determine if the network device is either configured to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period or configured to use an authentication server which would perform this function. If the limit of three consecutive invalid logon attempts by a user during a 15-minute time period is not enforced, this is a finding.
Fix: F-59921r1_fix
Configure the network device or its associated authentication server to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-APP-000068-NDM-000215
- Vuln IDs
-
- V-55057
- Rule IDs
-
- SV-69303r1_rule
Checks: C-55679r3_chk
Determine if the network device is configured to present a DoD-approved banner that is formatted in accordance with DTM-08-060. If such a banner is not presented, this is a finding. Use the following verbiage for applications that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
Fix: F-59923r1_fix
Configure the network device to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-APP-000069-NDM-000216
- Vuln IDs
-
- V-55059
- Rule IDs
-
- SV-69305r2_rule
Checks: C-55681r2_chk
Determine if the network device is configured to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access. If the network device does not retain the banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access, this is a finding.
Fix: F-59925r2_fix
Configure the network device to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000052
- Version
- SRG-APP-000075-NDM-000217
- Vuln IDs
-
- V-55061
- Rule IDs
-
- SV-69307r1_rule
Checks: C-55683r1_chk
Determine if the network device is either configured to notify the administrator of the date and time of their last login or configured to use an authentication server which would perform this function. If the administrator is not notified of the date and time of the last login upon successful login, this is a finding.
Fix: F-59927r1_fix
Configure the network device to notify the administrator of the date and time of the last login upon successful login.
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000053
- Version
- SRG-APP-000076-NDM-000218
- Vuln IDs
-
- V-55063
- Rule IDs
-
- SV-69309r1_rule
Checks: C-55685r1_chk
Determine if the network device is either configured to notify the administrator of the number of unsuccessful login attempts since the last successful login or configured to use an authentication server which would perform this function. If the administrator is not notified of the number of unsuccessful login attempts since the last successful login, this is a finding.
Fix: F-59929r1_fix
Configure the network device to notify the administrator of the number of unsuccessful login attempts since the last successful login, upon successful login.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000079-NDM-000219
- Vuln IDs
-
- V-55065
- Rule IDs
-
- SV-69311r1_rule
Checks: C-55687r1_chk
Determine if the network device notifies the administrator of changes to access and/or privilege parameters of the administrator's account that occurred since the last logon. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the administrator is not notified of changes to access and/or privilege parameters of the administrator's account that occurred since the last logon, this is a finding.
Fix: F-59931r1_fix
Configure the network device to notify the administrator of changes to access and/or privilege parameters of the administrator's account that occurred since the last logon.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-APP-000343-NDM-000289
- Vuln IDs
-
- V-55067
- Rule IDs
-
- SV-69313r1_rule
Checks: C-55689r1_chk
Determine if the network device audits the execution of privileged functions. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not audit the execution of privileged functions, this is a finding.
Fix: F-59933r1_fix
Configure the network device to audit the execution of privileged functions.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-NDM-000290
- Vuln IDs
-
- V-55069
- Rule IDs
-
- SV-69315r1_rule
Checks: C-55691r1_chk
Determine if the network device automatically locks the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If an account is not automatically locked out until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded, this is a finding.
Fix: F-59935r1_fix
Configure the network device or its associated authentication server to automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000346-NDM-000291
- Vuln IDs
-
- V-55071
- Rule IDs
-
- SV-69317r1_rule
Checks: C-55693r1_chk
Determine if the network device notifies the administrator upon successful logon of the location of last logon (terminal or IP address) in addition to the date and time of the last logon. If the administrator is not notified of the location of last logon (terminal or IP address) upon successful logon, this is a finding.
Fix: F-59937r1_fix
Configure the network device to notify the administrator upon successful logon of the location of last logon (terminal or IP address).
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- SRG-APP-000353-NDM-000292
- Vuln IDs
-
- V-55073
- Rule IDs
-
- SV-69319r1_rule
Checks: C-55695r1_chk
Determine if the network device provides the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time. This requirement may be verified by configuration review or demonstration. If the network device does not provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time, this is a finding.
Fix: F-59939r1_fix
Configure the network device to provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-NDM-000293
- Vuln IDs
-
- V-55075
- Rule IDs
-
- SV-69321r1_rule
Checks: C-55697r1_chk
Determine if the network device allocates audit record storage capacity in accordance with organization-defined audit record storage requirements. This requirement may be verified by configuration review or vendor-provided information. This requirement may be met through use of a properly configured syslog server if the device is configured to use the syslog server. If audit record store capacity is not allocated in accordance with organization-defined audit record storage requirements, this is a finding.
Fix: F-59941r1_fix
Configure the network device to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-NDM-000294
- Vuln IDs
-
- V-55077
- Rule IDs
-
- SV-69323r1_rule
Checks: C-55699r1_chk
Determine if the network device generates an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. This requirement may be verified by configuration review or validated test results. If an immediate alert is not generated when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity, this is a finding.
Fix: F-59943r1_fix
Configure the network device to generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-NDM-000295
- Vuln IDs
-
- V-55079
- Rule IDs
-
- SV-69325r1_rule
Checks: C-55701r1_chk
Determine if the network device generates an immediate alert of all audit failure events requiring real-time alerts. This requirement may be verified by configuration review or validated test results. If an immediate alert of all audit failure events requiring real-time alerts is not generated, this is a finding.
Fix: F-59945r1_fix
Configure the network device to generate an immediate real-time alert of all audit failure events requiring real-time alerts.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001891
- Version
- SRG-APP-000371-NDM-000296
- Vuln IDs
-
- V-55081
- Rule IDs
-
- SV-69327r1_rule
Checks: C-55703r1_chk
Check the network device configuration to determine if the device compares internal information system clocks at least every 24 hours with an authoritative time server. If this comparison does not occur at least every 24 hours, this is a finding.
Fix: F-59947r1_fix
Configure the network device to compare internal information system clocks at least every 24 hours with an authoritative time server.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-002046
- Version
- SRG-APP-000372-NDM-000297
- Vuln IDs
-
- V-55083
- Rule IDs
-
- SV-69329r1_rule
Checks: C-55705r1_chk
Check the network device configuration to determine if the device synchronizes internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period. If this synchronization is not occurring when the time difference is greater than the organization-defined time period, this is a finding.
Fix: F-59949r1_fix
Configure the network device to synchronize internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-NDM-000220
- Vuln IDs
-
- V-55085
- Rule IDs
-
- SV-69331r1_rule
Checks: C-55707r1_chk
Determine if the network device protects against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. This requires logging all administrator access and configuration activity. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. (Note that two-factor authentication of administrator access is needed to support this requirement.) If the network device does not protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation, this is a finding.
Fix: F-59951r1_fix
Configure the network device or its associated authentication server to protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. Examples that support this include configuring the audit log to capture administration login events and configuration changes to the network device.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-NDM-000221
- Vuln IDs
-
- V-55087
- Rule IDs
-
- SV-69333r1_rule
Checks: C-55709r1_chk
Determine if the network device provides audit record generation capability for DoD-defined auditable events within the network device. The list of events for which the device will provide an audit record generation capability is outlined in the vulnerability discussion. This requirement may be verified by demonstration or configuration review. If the network device does not provide audit record generation capability for DoD-defined auditable events within the network device, this is a finding.
Fix: F-59953r1_fix
Configure the network device to provide audit record generation capability for DoD-defined auditable events within the network device.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-APP-000090-NDM-000222
- Vuln IDs
-
- V-55089
- Rule IDs
-
- SV-69335r2_rule
Checks: C-55711r2_chk
Determine if the network device allows only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If parties other than the ISSM (or individuals or roles appointed by the ISSM) are allowed to select which auditable events are to be audited, this is a finding. If the ISSM (or individuals or roles appointed by the ISSM) is not allowed to select which auditable events are to be audited, this is a finding.
Fix: F-59955r2_fix
Configure the network device settings to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are audited.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-NDM-000223
- Vuln IDs
-
- V-55091
- Rule IDs
-
- SV-69337r1_rule
Checks: C-55713r1_chk
Determine if the network device generates audit records when successful/unsuccessful attempts to access privileges occur. If the network device does not generate audit records when successful/unsuccessful attempts to access privileges occur, this is a finding.
Fix: F-59957r1_fix
Configure the network device to generate audit records when successful/unsuccessful attempts to access privileges occur.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-NDM-000224
- Vuln IDs
-
- V-55093
- Rule IDs
-
- SV-69339r1_rule
Checks: C-55715r1_chk
Determine if the network device initiates session auditing upon startup. This requirement may be verified by validated test results. If the network device does not initiate session auditing upon startup, this is a finding.
Fix: F-59959r1_fix
Configure the network device to initiate session auditing upon startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-NDM-000225
- Vuln IDs
-
- V-55095
- Rule IDs
-
- SV-69341r1_rule
Checks: C-55717r1_chk
Determine if the network device produces audit log records containing sufficient information to establish what type of event occurred. If the network device does not produce audit log records containing sufficient information to establish what type of event occurred, this is a finding.
Fix: F-59961r1_fix
Configure the network device to produce audit log records containing sufficient information to establish what type of event occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-NDM-000226
- Vuln IDs
-
- V-55097
- Rule IDs
-
- SV-69343r1_rule
Checks: C-55719r1_chk
Determine if the network device is configured to produce audit records containing information to establish when (date and time) the events occurred. If the network device does not produce audit records containing information to establish when the events occurred, this is a finding.
Fix: F-59963r1_fix
Configure the network device to produce audit records containing information to establish when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-NDM-000227
- Vuln IDs
-
- V-55099
- Rule IDs
-
- SV-69345r1_rule
Checks: C-55721r1_chk
Determine if the network device is configured to produce audit records containing information to establish where the events occurred. If the network device does not produce audit records containing information to establish where the events occurred, this is a finding.
Fix: F-59965r1_fix
Configure the network device to produce audit records containing information to establish where the events occurred.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-NDM-000245
- Vuln IDs
-
- V-55101
- Rule IDs
-
- SV-69347r2_rule
Checks: C-55723r2_chk
Determine if the network device prohibits the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services. If any unnecessary or nonsecure functions are permitted, this is a finding.
Fix: F-59967r2_fix
Configure the network device to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-NDM-000246
- Vuln IDs
-
- V-55103
- Rule IDs
-
- SV-69349r1_rule
Checks: C-55725r1_chk
Determine if the network device uniquely identifies and authenticates organizational administrators. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If organizational administrators are not uniquely identified and authenticated, this is a finding.
Fix: F-59969r1_fix
Configure the network device to uniquely identify and authenticate organizational administrators.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-NDM-000247
- Vuln IDs
-
- V-55105
- Rule IDs
-
- SV-69351r1_rule
Checks: C-55727r1_chk
Determine if the network device uses multifactor authentication for network access to privileged accounts. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If multifactor authentication is not used for network access to privileged accounts, this is a finding.
Fix: F-59971r1_fix
Configure the network device to use multifactor authentication for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- SRG-APP-000151-NDM-000248
- Vuln IDs
-
- V-55107
- Rule IDs
-
- SV-69353r1_rule
Checks: C-55729r1_chk
Determine if the network device uses multifactor authentication for local access to privileged accounts. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If multifactor authentication is not used for local access to privileged accounts, this is a finding.
Fix: F-59973r1_fix
Configure the network device or its associated authentication server to use multifactor authentication for local access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- SRG-APP-000153-NDM-000249
- Vuln IDs
-
- V-55109
- Rule IDs
-
- SV-69355r1_rule
Checks: C-55733r1_chk
Determine if the network device ensures that administrators are authenticated with an individual authenticator prior to using a group authenticator. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not authenticate administrators with an individual authenticator prior to using a group authenticator, this is a finding.
Fix: F-59975r1_fix
Configure the network device to ensure administrators are authenticated with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000156-NDM-000250
- Vuln IDs
-
- V-55111
- Rule IDs
-
- SV-69357r1_rule
Checks: C-55735r1_chk
Determine if the network device implements replay-resistant authentication mechanisms for network access to privileged accounts. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not implement replay-resistant authentication mechanisms for network access to privileged accounts, this is a finding.
Fix: F-59977r1_fix
Configure the network device to implement replay-resistant authentication mechanisms for network access to privileged accounts.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- SRG-APP-000163-NDM-000251
- Vuln IDs
-
- V-55113
- Rule IDs
-
- SV-69359r2_rule
Checks: C-55935r1_chk
Determine if the network device disables identifiers after 35 days of inactivity. This requirement may be verified by configuration review or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If identifiers are not disabled after 35 days of inactivity, this is a finding.
Fix: F-60179r1_fix
Configure the network device or its associated authentication server to disable identifiers after 35 days of inactivity.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SRG-APP-000164-NDM-000252
- Vuln IDs
-
- V-55115
- Rule IDs
-
- SV-69361r1_rule
Checks: C-55737r1_chk
Determine if the network device or its associated authentication server enforces a minimum 15-character password length. This requirement may be verified by demonstration or configuration review. If the network device or its associated authentication server does not enforce a minimum 15-character password length, this is a finding.
Fix: F-59979r1_fix
Configure the network device or its associated authentication server to enforce a minimum 15-character password length.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- SRG-APP-000165-NDM-000253
- Vuln IDs
-
- V-55117
- Rule IDs
-
- SV-69363r1_rule
Checks: C-55739r1_chk
Determine if the network device or its associated authentication server prohibits password reuse for a minimum of five generations. This requirement may be verified by demonstration or configuration review. If the network device or its associated authentication server does not prohibit password reuse for a minimum of five generations, this is a finding.
Fix: F-59981r1_fix
Configure the network device or its associated authentication server to prohibit password reuse for a minimum of five generations.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- SRG-APP-000166-NDM-000254
- Vuln IDs
-
- V-55119
- Rule IDs
-
- SV-69365r1_rule
Checks: C-55741r1_chk
If multifactor authentication is not supported and passwords are used, check to see that the network device or its associated authentication server enforces password complexity by requiring that at least one upper-case character be used. This requirement may be verified by demonstration, configuration review or validated test results. If the network device or its associated authentication server does not require that at least one upper-case character be used in each password, this is a finding.
Fix: F-59983r1_fix
Configure the network device or its associated authentication server to enforce password complexity by requiring that at least one upper-case character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- SRG-APP-000167-NDM-000255
- Vuln IDs
-
- V-55121
- Rule IDs
-
- SV-69367r1_rule
Checks: C-55743r1_chk
If multifactor authentication is not supported and passwords are used, check to see that the network device or its associated authentication server enforces password complexity by requiring that at least one lower-case character be used. This requirement may be verified by demonstration, configuration review or validated test results. If the network device or its associated authentication server does not require that at least one lower-case character be used in each password, this is a finding.
Fix: F-59985r1_fix
Configure the network device or its associated authentication server to enforce password complexity by requiring that at least one lower-case character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- SRG-APP-000168-NDM-000256
- Vuln IDs
-
- V-55123
- Rule IDs
-
- SV-69369r1_rule
Checks: C-55745r1_chk
If multifactor authentication is not supported and passwords are used, check to see that the network device or its associated authentication server enforces password complexity by requiring that at least one numeric character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device or its associated authentication server does not require that at least one numeric character be used in each password, this is a finding.
Fix: F-59987r1_fix
Configure the network device or its associated authentication server to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- SRG-APP-000169-NDM-000257
- Vuln IDs
-
- V-55125
- Rule IDs
-
- SV-69371r1_rule
Checks: C-55747r1_chk
If multifactor authentication is not supported and passwords are used, check to see that the network device or its associated authentication server enforces password complexity by requiring that at least one special character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device or its associated authentication server does not require that at least one special character be used in each password, this is a finding.
Fix: F-59989r1_fix
Configure the network device or its associated authentication server to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- SRG-APP-000170-NDM-000329
- Vuln IDs
-
- V-55127
- Rule IDs
-
- SV-69373r2_rule
Checks: C-55749r2_chk
If multifactor authentication is not supported, determine if the network device or its associated authentication server requires that when a password is changed, the characters are changed in at least eight of the positions within the password. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device or its associated authentication server does not require that when a password is changed, the characters are changed in at least eight of the positions within the password, this is a finding.
Fix: F-59991r2_fix
Configure the network device or its associated authentication server to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-NDM-000228
- Vuln IDs
-
- V-55129
- Rule IDs
-
- SV-69375r1_rule
Checks: C-55731r1_chk
Determine if the network device is configured to produce audit records containing information to establish the source (apparent cause) of the event. If the network device does not produce audit records containing information to establish the source of the event, this is a finding.
Fix: F-59993r1_fix
Configure the network device to produce audit records containing information to establish the source of the event.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- SRG-APP-000171-NDM-000258
- Vuln IDs
-
- V-55131
- Rule IDs
-
- SV-69377r1_rule
Checks: C-55751r1_chk
Determine if the network device or its associated authentication server enforces password encryption for storage. This requirement may be verified by demonstration or configuration review. If the network device or its associated authentication server stores unencrypted representations of passwords, this is a finding.
Fix: F-59995r1_fix
Configure the network device or its associated authentication server to store only encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-NDM-000259
- Vuln IDs
-
- V-55133
- Rule IDs
-
- SV-69379r1_rule
Checks: C-55753r1_chk
Determine if the network device or its associated authentication server transmits only encrypted representations of passwords. This requirement may be verified by demonstration or configuration review. If the network device or the associated authentication server transmits unencrypted representations of passwords, this is a finding.
Fix: F-59997r1_fix
Configure the network device or its associated authentication server to transmit only encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- SRG-APP-000173-NDM-000260
- Vuln IDs
-
- V-55135
- Rule IDs
-
- SV-69381r2_rule
Checks: C-55755r1_chk
Determine if the network device or its associated authentication server enforces 24 hours/1 day as the minimum password lifetime. This requirement may be verified by demonstration or configuration review. If the network device or its associated authentication server does not enforce 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-59999r1_fix
Configure the network device or its associated authentication server to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-NDM-000229
- Vuln IDs
-
- V-55137
- Rule IDs
-
- SV-69383r1_rule
Checks: C-55757r1_chk
Determine if the network device is configured to produce audit records that contain information to establish the outcome of the event. If the network device does not produce audit records that contain information to establish the outcome of the event, this is a finding.
Fix: F-60001r1_fix
Configure the network device to produce audit records that contain information to establish the outcome of the event.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- SRG-APP-000174-NDM-000261
- Vuln IDs
-
- V-55139
- Rule IDs
-
- SV-69385r1_rule
Checks: C-55759r1_chk
Determine if the network device or its associated authentication server enforces a 60-day maximum password lifetime. This requirement may be verified by demonstration or configuration review. If the network device or its associated authentication server does not enforce a 60-day maximum password lifetime, this is a finding.
Fix: F-60003r1_fix
Configure the network device or its associated authentication server to enforce a 60-day maximum password lifetime.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-NDM-000262
- Vuln IDs
-
- V-55141
- Rule IDs
-
- SV-69387r1_rule
Checks: C-55761r1_chk
If PKI-based authentication is being used, determine if the network device validates certificates by constructing a certification path to an accepted trust anchor. This requirement may be verified by configuration review or validated test results. If PKI-based authentication is being used and the network device does not validate certificates by constructing a certification path to an accepted trust anchor, this is a finding.
Fix: F-60005r1_fix
Configure the network device to validate certificates by constructing a certification path to an accepted trust anchor when utilizing PKI-based authentication.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-NDM-000230
- Vuln IDs
-
- V-55143
- Rule IDs
-
- SV-69389r1_rule
Checks: C-55763r1_chk
Determine if the network device generates audit records containing information that establishes the identity of any individual or process associated with the event. This requirement may be verified by demonstration or validated test results. If the network device does not generate audit records containing information that establishes the identity of any individual or process associated with the event, this is a finding.
Fix: F-60007r1_fix
Configure the network device to generate audit records containing information that establishes the identity of any individual or process associated with the event.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-NDM-000263
- Vuln IDs
-
- V-55145
- Rule IDs
-
- SV-69391r1_rule
Checks: C-55765r1_chk
Determine if the network device maps the authenticated identity to the user account for PKI-based authentication. This requirement may be verified by configuration review or validated test results. If the network device does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.
Fix: F-60009r1_fix
Configure the network device to map the authenticated identity to the user account for PKI-based authentication.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-NDM-000231
- Vuln IDs
-
- V-55147
- Rule IDs
-
- SV-69393r1_rule
Checks: C-55767r1_chk
Determine if the network device generates audit records containing the full-text recording of privileged commands. If such audit records are not being generated, this is a finding.
Fix: F-60011r1_fix
Configure the network device to generate audit records containing the full-text recording of privileged commands.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- SRG-APP-000178-NDM-000264
- Vuln IDs
-
- V-55149
- Rule IDs
-
- SV-69395r1_rule
Checks: C-55769r1_chk
Determine if the network device obscures feedback of authentication information during the authentication process. This requirement may be verified by demonstration. If the network device does not obscure feedback of authentication information during the authentication process, this is a finding.
Fix: F-60013r1_fix
Configure the network device to obscure feedback of authentication information during the authentication process.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-NDM-000232
- Vuln IDs
-
- V-55151
- Rule IDs
-
- SV-69397r2_rule
Checks: C-55771r2_chk
Determine if the network device is configured to alert the ISSO and SA (at a minimum) in the event of an audit processing failure. This requirement can be met by a central audit server if the network device is configured to send audit logs to that audit server. If the ISSO and SA are not being alerted in the event of an audit processing failure, this is a finding.
Fix: F-60015r2_fix
Configure the network device to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-NDM-000265
- Vuln IDs
-
- V-55153
- Rule IDs
-
- SV-69399r1_rule
Checks: C-55773r1_chk
Determine if the network device uses mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. This requirement may be verified by validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device or its associated authentication server uses mechanisms that do not meet the requirements for authentication to a cryptographic module, this is a finding.
Fix: F-60017r1_fix
Configure the network device or its associated authentication server to use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000879
- Version
- SRG-APP-000186-NDM-000266
- Vuln IDs
-
- V-55155
- Rule IDs
-
- SV-69401r1_rule
Checks: C-55777r1_chk
Determine if the network device terminates all sessions and network connections when nonlocal device maintenance is completed. This requirement may be verified by demonstration or validated test results. If the network device does not terminate all sessions and network connections when nonlocal device maintenance is complete, this is a finding.
Fix: F-60021r1_fix
Configure the network device to terminate all sessions and network connections when nonlocal device maintenance is completed.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-NDM-000233
- Vuln IDs
-
- V-55157
- Rule IDs
-
- SV-69403r1_rule
Checks: C-55775r1_chk
Determine if the network device shuts down by default upon audit failure. When availability is an overriding concern, responses described in the vulnerability discussion may be used. These may be verified by demonstration, validated test results, or TTPs. If the network device does not shut down by default upon audit failure or, when availability is an overriding concern, perform responses described in the vulnerability discussion, this is a finding.
Fix: F-60019r1_fix
Configure the network device to shut down by default upon audit failure or, when availability is an overriding concern, perform responses described in the vulnerability discussion.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SRG-APP-000190-NDM-000267
- Vuln IDs
-
- V-55159
- Rule IDs
-
- SV-69405r1_rule
Checks: C-55779r1_chk
Determine if the network device terminates the connection associated with a device management session at the end of the session or after 10 minutes of inactivity. This requirement may be verified by demonstration or configuration review. If the network device does not terminate the connection associated with a device management session at the end of the session or after 10 minutes of inactivity, this is a finding.
Fix: F-60023r1_fix
Configure the network device to terminate the connection associated with a device management session at the end of the session or after 10 minutes of inactivity.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-APP-000220-NDM-000268
- Vuln IDs
-
- V-55161
- Rule IDs
-
- SV-69407r1_rule
Checks: C-55783r1_chk
If the network device uses a web interface for device management, determine if the network device invalidates session identifiers upon administrator logout or other session termination. This requirement may be verified by validated test results. If the network device does not invalidate session identifiers upon administrator logout or other session termination, this is a finding.
Fix: F-60027r1_fix
Configure the network device to invalidate session identifiers upon administrator logout or other session termination.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-NDM-000269
- Vuln IDs
-
- V-55163
- Rule IDs
-
- SV-69409r1_rule
Checks: C-55785r1_chk
If the network device uses a web interface for device management, determine if it recognizes only system-generated session identifiers. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device recognizes other session identifiers than the system-generated ones, this is a finding.
Fix: F-60029r1_fix
Configure the network device to recognize only system-generated session identifiers.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-NDM-000234
- Vuln IDs
-
- V-55165
- Rule IDs
-
- SV-69411r1_rule
Checks: C-55781r1_chk
Determine if the network device uses internal system clocks to generate time stamps for audit records. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not use internal system clocks to generate time stamps for audit records, this is a finding.
Fix: F-60025r1_fix
Configure the network device to use internal system clocks to generate time stamps for audit records.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-NDM-000270
- Vuln IDs
-
- V-55167
- Rule IDs
-
- SV-69413r1_rule
Checks: C-55787r1_chk
If the network device uses a web interface for device management, determine if it generates unique session identifiers using a FIPS 140-2 approved random number generator. This requirement may be verified by validated NIST certification and vendor documentation. If the network device does not use unique session identifiers for its web interface for device management, this is a finding.
Fix: F-60031r1_fix
Configure the network device to generate unique session identifiers using a FIPS 140-2 approved random number generator.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-NDM-000235
- Vuln IDs
-
- V-55169
- Rule IDs
-
- SV-69415r1_rule
Checks: C-55789r1_chk
Determine if the network device protects audit information from any type of unauthorized read access with such methods as least privilege permissions, restrictions on the location and number of log file repositories and not allowing for the unfettered manipulation of or access to audit records via the device interface. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not protect audit information from any type of unauthorized read access, this is a finding.
Fix: F-60033r1_fix
Configure the network device to protect audit information from any type of unauthorized read access.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-NDM-000271
- Vuln IDs
-
- V-55171
- Rule IDs
-
- SV-69417r2_rule
Checks: C-55791r2_chk
List the contents of the network device’s local storage, including any drives supporting removable media (such as flash drives or CDs) and check the file permissions of all files on those drives. If any files allow read or write access by accounts not specifically authorized access or by non-privileged accounts, this is a finding.
Fix: F-60035r2_fix
Set the file permissions on files on the network device or on removable media used by the device so that only authorized administrators can read or change their contents.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-NDM-000236
- Vuln IDs
-
- V-55173
- Rule IDs
-
- SV-69419r1_rule
Checks: C-55793r1_chk
Determine if the network device protects audit information from any type of unauthorized modification with such methods as ensuring log files receive the proper file system permissions, limiting log data locations and leveraging user permissions and roles to identify the user accessing the data and the corresponding rights that the user enjoys. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not protect audit information from unauthorized modification, this is a finding.
Fix: F-60037r1_fix
Configure the network device to protect audit information from unauthorized modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-APP-000234-NDM-000272
- Vuln IDs
-
- V-55175
- Rule IDs
-
- SV-69421r3_rule
Checks: C-55795r4_chk
Review the network device configuration to determine if it automatically disables or removes emergency accounts, except the emergency administration account, after 72 hours or is configured to use an authentication server which would perform this function. If the use of emergency accounts is prohibited, this is not a finding. If the network device or its associated authentication server does not automatically disable or remove emergency accounts, except the emergency administration account, after 72 hours, this is a finding.
Fix: F-60039r3_fix
Configure the network device or its associated authentication server to automatically disable or remove emergency accounts, except the emergency administration account, after 72 hours. An acceptable method would be to place an expiration date on the accounts upon creation.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-APP-000267-NDM-000273
- Vuln IDs
-
- V-55177
- Rule IDs
-
- SV-69423r2_rule
Checks: C-55797r1_chk
Determine if the network device is configured to reveal error messages only to authorized individuals. This requirement may be verified by demonstration or configuration review. This requirement can be met by a central audit server if the network device is configured to send audit logs to that audit server. If the network device reveals error messages to any unauthorized individuals, this is a finding.
Fix: F-60041r1_fix
Configure the network device or its associated audit server to reveal error messages only to authorized individuals.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-NDM-000237
- Vuln IDs
-
- V-55179
- Rule IDs
-
- SV-69425r1_rule
Checks: C-55799r1_chk
Determine if the network device protects audit information from any type of unauthorized deletion with such methods as ensuring log files receive the proper file system permissions utilizing file system protections, restricting access to log data and backing up log data to ensure log data is retained, and leveraging user permissions and roles to identify the user accessing the data and the corresponding rights the user enjoys. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not protect audit information from unauthorized deletion, this is a finding.
Fix: F-60043r1_fix
Configure the network device to protect audit information from unauthorized deletion.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000268-NDM-000274
- Vuln IDs
-
- V-55181
- Rule IDs
-
- SV-69427r1_rule
Checks: C-55801r1_chk
Determine if the network device activates a system alert message, sends an alarm, and/or automatically shuts down when a component failure is detected. This requirement may be verified by demonstration or configuration review. If the network device does not activate a system alert message, send an alarm, or automatically shut down when a component failure is detected, this is a finding.
Fix: F-60045r1_fix
Configure the network device to activate a system alert message, send an alarm, and/or automatically shut down when a component failure is detected.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-NDM-000238
- Vuln IDs
-
- V-55183
- Rule IDs
-
- SV-69429r1_rule
Checks: C-55803r1_chk
If the network device provides audit tools, check the device to determine if it protects audit tools from unauthorized access. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not protect its audit tools from unauthorized access, this is a finding.
Fix: F-60047r1_fix
Configure the network device to protect audit tools from unauthorized access.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001683
- Version
- SRG-APP-000291-NDM-000275
- Vuln IDs
-
- V-55185
- Rule IDs
-
- SV-69431r1_rule
Checks: C-55805r1_chk
Determine if the network device generates alerts that can be forwarded to the administrators and IAO when accounts are created. This requirement may be verified by demonstration or configuration review. If the network device is configured to use an authentication server which would perform this function, this is not a finding. If alerts are not generated when accounts are created and forwarded to the administrators and IAO, this is a finding.
Fix: F-60049r1_fix
Configure the network device or its associated authentication server to send a notification message to the administrators and IAO when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001684
- Version
- SRG-APP-000292-NDM-000276
- Vuln IDs
-
- V-55187
- Rule IDs
-
- SV-69433r1_rule
Checks: C-55807r1_chk
Determine if the network device generates alerts that can be forwarded to the administrators and IAO when accounts are modified. This requirement may be verified by demonstration or configuration review. If the network device is configured to use an authentication server which would perform this function, this is not a finding. If alerts are not generated when accounts are modified and forwarded to the administrators and IAO, this is a finding.
Fix: F-60051r1_fix
Configure the network device or its associated authentication server to send a notification message to the administrators and IAO when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001685
- Version
- SRG-APP-000293-NDM-000277
- Vuln IDs
-
- V-55189
- Rule IDs
-
- SV-69435r1_rule
Checks: C-55811r1_chk
Determine if the network device generates alerts that can be forwarded to the administrators and IAO when accounts are disabled. This requirement may be verified by demonstration or configuration review. If the network device is configured to use an authentication server which would perform this function, this is not a finding. If alerts are not generated when accounts are disabled and forwarded to the administrators and IAO, this is a finding.
Fix: F-60055r1_fix
Configure the network device or its associated authentication server to send a notification message to the administrators and IAO when accounts are disabled.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-NDM-000239
- Vuln IDs
-
- V-55191
- Rule IDs
-
- SV-69437r1_rule
Checks: C-55809r1_chk
If the network device provides audit tools, check the device to determine if it protects audit tools from unauthorized modification. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not protect its audit tools from unauthorized modification, this is a finding.
Fix: F-60053r1_fix
Configure the network device to protect audit tools from unauthorized modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001686
- Version
- SRG-APP-000294-NDM-000278
- Vuln IDs
-
- V-55193
- Rule IDs
-
- SV-69439r1_rule
Checks: C-55813r1_chk
Determine if the network device generates alerts that can be forwarded to the administrators and IAO when accounts are removed. This requirement may be verified by demonstration or configuration review. If the network device is configured to use an authentication server which would perform this function, this is not a finding. If alerts are not generated when accounts are removed and forwarded to the administrators and IAO, this is a finding.
Fix: F-60057r1_fix
Configure the network device or its associated authentication server to send a notification message to the administrators and IAO when accounts are removed.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-NDM-000279
- Vuln IDs
-
- V-55195
- Rule IDs
-
- SV-69441r1_rule
Checks: C-55815r1_chk
Review the network device configuration to determine if the device automatically terminates an administrator session after organization-defined conditions or trigger events requiring session disconnect. This requirement may be verified by demonstration, configuration review, or validated test results. If the device does not automatically terminate an administrator session under the designated conditions or trigger events, this is a finding.
Fix: F-60059r1_fix
Configure the network device to automatically terminate an administrator session after organization-defined conditions or trigger events requiring session disconnect.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-NDM-000280
- Vuln IDs
-
- V-55197
- Rule IDs
-
- SV-69443r1_rule
Checks: C-55817r1_chk
Review the network device configuration to determine if it provides a logout capability for administrator-initiated communication sessions. This requirement may be verified by demonstration. If the network device does not provide a logout capability for these sessions, this is a finding.
Fix: F-60061r1_fix
Configure the network device to provide a logout capability for administrator-initiated communication sessions.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-APP-000297-NDM-000281
- Vuln IDs
-
- V-55199
- Rule IDs
-
- SV-69445r2_rule
Checks: C-55819r2_chk
This requirement may be verified by demonstration. If an explicit logoff message is not displayed, or provides clear evidence that the session has been terminated, this is a finding.
Fix: F-60063r2_fix
Configure the network device to display an explicit logoff message to administrators indicating the reliable termination of authenticated communications sessions. This may be a capability the device is inherently capable of.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002142
- Version
- SRG-APP-000317-NDM-000282
- Vuln IDs
-
- V-55201
- Rule IDs
-
- SV-69447r1_rule
Checks: C-55821r1_chk
Determine if the network device terminates shared/group account credentials when members leave the group. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. This requirement is not applicable if the device does not support shared/group credentials. If the network device does not terminate shared/group credentials when members leave the group, this is a finding.
Fix: F-60065r1_fix
Configure the network device to terminate shared/group account credentials when members leave the group.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-APP-000319-NDM-000283
- Vuln IDs
-
- V-55203
- Rule IDs
-
- SV-69449r1_rule
Checks: C-55823r1_chk
Determine if the network device automatically audits account enabling actions. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account enabling actions are not automatically audited, this is a finding.
Fix: F-60067r1_fix
Configure the network device or its associated authentication server to automatically audit account enabling actions.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-NDM-000240
- Vuln IDs
-
- V-55205
- Rule IDs
-
- SV-69451r1_rule
Checks: C-55825r1_chk
If the network device provides audit tools, check to see that the network device protects audit tools from unauthorized deletion. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not protect its audit tools from unauthorized deletion, this is a finding.
Fix: F-60069r1_fix
Configure the network device to protect audit tools from unauthorized deletion.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- SRG-APP-000320-NDM-000284
- Vuln IDs
-
- V-55207
- Rule IDs
-
- SV-69453r2_rule
Checks: C-55827r1_chk
Determine if the network device generates an immediate alert for account enabling actions. This requirement may be verified by demonstration, configuration review or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not generate an immediate alert for account enabling actions, this is a finding.
Fix: F-60071r1_fix
Configure the network device or its associated authentication server to generate an immediate alert for account enabling actions.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- SRG-APP-000125-NDM-000241
- Vuln IDs
-
- V-55209
- Rule IDs
-
- SV-69455r1_rule
Checks: C-55831r1_chk
Determine if the network device backs up audit records at least every seven days onto a different system or system component than the system or component being audited. This requirement may be verified by configuration review. This requirement can be met by use of a syslog/audit log server if the device is configured to send logs to that server. Backup requirements would be levied on the target server but are not a part of this check. If the network device does not back up audit records at least every seven days onto a different system or system component than the system or component being audited, this is a finding.
Fix: F-60075r1_fix
Configure the network device to back up audit records at least every seven days onto a different system or system component than the system or component being audited.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000325-NDM-000285
- Vuln IDs
-
- V-55211
- Rule IDs
-
- SV-69457r2_rule
Checks: C-55829r2_chk
Review the device configuration to determine if it uses an IETF Internet standard authentication protocol. Examples include RADIUS, EAP, LDAP, and TACACS+. If it is not configured to use an IETF Internet standard authentication protocol, this is a finding.
Fix: F-60073r2_fix
Configure the network device to use an IETF Internet standard authentication protocol.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001350
- Version
- SRG-APP-000126-NDM-000242
- Vuln IDs
-
- V-55213
- Rule IDs
-
- SV-69459r1_rule
Checks: C-55833r1_chk
Determine if the network device uses cryptographic mechanisms to protect the integrity of audit information. This requirement may be verified by configuration review or validated test results. If the network device does not use cryptographic mechanisms to protect the integrity of audit information, this is a finding.
Fix: F-60077r1_fix
Configure the network device to use cryptographic mechanisms to protect the integrity of audit information.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-APP-000328-NDM-000286
- Vuln IDs
-
- V-55215
- Rule IDs
-
- SV-69461r1_rule
Checks: C-55835r1_chk
Check the network device to determine if organization-defined discretionary access control policies are enforced over defined subjects and objects. If it does not use discretionary access control, this is not a finding. If organization-defined discretionary access control policies are not enforced over defined subjects and objects, this is a finding.
Fix: F-60079r1_fix
Configure the network device to enforce organization-defined discretionary access control policies over defined subjects and objects.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000329-NDM-000287
- Vuln IDs
-
- V-55217
- Rule IDs
-
- SV-69463r1_rule
Checks: C-55837r1_chk
Determine if the network device enforces role-based access control policy over defined subjects and objects. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If role-based access control policy is not enforced over defined subjects and objects, this is a finding.
Fix: F-60081r1_fix
Configure the network device or its associated authentication server to enforce role-based access control policy over defined subjects and objects.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-NDM-000243
- Vuln IDs
-
- V-55219
- Rule IDs
-
- SV-69465r1_rule
Checks: C-55839r1_chk
Determine if the network device prevents the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization, this is a finding.
Fix: F-60083r1_fix
Configure the network device to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-NDM-000288
- Vuln IDs
-
- V-55221
- Rule IDs
-
- SV-69467r1_rule
Checks: C-55841r1_chk
Determine if the network device prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not prevent non-privileged users from executing privileged functions, this is a finding.
Fix: F-60085r1_fix
Configure the network device to prevent non-privileged users from executing privileged functions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000373-NDM-000298
- Vuln IDs
-
- V-55231
- Rule IDs
-
- SV-69477r1_rule
Checks: C-55851r1_chk
Determine if the network device is configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources. If the network device is not configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources, this is a finding.
Fix: F-60095r1_fix
Configure the network device to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-NDM-000299
- Vuln IDs
-
- V-55233
- Rule IDs
-
- SV-69479r1_rule
Checks: C-55853r1_chk
Determine if the network device records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). This requirement may be verified by demonstration or configuration review. If the network device does not record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT), this is a finding.
Fix: F-60097r1_fix
Configure the network device to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-NDM-000300
- Vuln IDs
-
- V-55235
- Rule IDs
-
- SV-69481r1_rule
Checks: C-55855r1_chk
Determine if the network device records time stamps for audit records that meet a granularity of one second for a minimum degree of precision. This requirement may be verified by demonstration or configuration. If the network device does not record time stamps for audit records that meet a granularity of one second for a minimum degree of precision, this is a finding.
Fix: F-60099r1_fix
Configure the network device to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001811
- Version
- SRG-APP-000377-NDM-000301
- Vuln IDs
-
- V-55237
- Rule IDs
-
- SV-69483r2_rule
Checks: C-55857r1_chk
Determine if the network device generates an alert when the unauthorized installation of software is detected. This requirement may be verified by demonstration or configuration review. The management/audit server that the network device sends alerts to would typically perform the function of sending these alerts to specific individuals. If the network device does not generate an alert when the unauthorized installation of software is detected, this is a finding.
Fix: F-60101r1_fix
Configure the network device to generate an alert when the unauthorized installation of software is detected.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- SRG-APP-000378-NDM-000302
- Vuln IDs
-
- V-55239
- Rule IDs
-
- SV-69485r1_rule
Checks: C-55859r1_chk
Determine if the network device prohibits installation of software without explicit privileged status. This requirement may be verified by demonstration or configuration review. If installation of software is not prohibited without explicit privileged status, this is a finding.
Fix: F-60103r1_fix
Configure the network device to prohibit installation of software without explicit privileged status.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-NDM-000304
- Vuln IDs
-
- V-55243
- Rule IDs
-
- SV-69489r1_rule
Checks: C-55863r1_chk
Determine if the network device enforces access restrictions associated with changes to device configuration. If the network device does not enforce such access restrictions, this is a finding.
Fix: F-60107r1_fix
Configure the network device to enforce access restrictions associated with changes to device configuration.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- SRG-APP-000381-NDM-000305
- Vuln IDs
-
- V-55245
- Rule IDs
-
- SV-69491r1_rule
Checks: C-55865r1_chk
Determine if the network device audits the enforcement actions used to restrict access associated with changes to the device. This requirement may be verified by demonstration, configuration review or validated test results. If the network device does not audit the enforcement actions used to restrict access associated with changes to the device, this is a finding.
Fix: F-60109r1_fix
Configure the network device to audit the enforcement actions used to restrict access associated with changes to the device.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-APP-000389-NDM-000306
- Vuln IDs
-
- V-55247
- Rule IDs
-
- SV-69493r1_rule
Checks: C-55867r1_chk
Determine if the network device requires users to re-authenticate when privilege escalation or role changes occur. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If users are not required to re-authenticate when privilege escalation or role changes occur, this is a finding.
Fix: F-60111r1_fix
Configure the network device or its associated authentication server to require users to re-authenticate when privilege escalation or role changes occur.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-NDM-000308
- Vuln IDs
-
- V-55251
- Rule IDs
-
- SV-69497r1_rule
Checks: C-55871r1_chk
Determine if the network device accepts PIV credentials. This requirement may be verified by demonstration. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not accept PIV credentials, this is a finding.
Fix: F-60115r1_fix
Configure the network device or its associated authentication server to accept PIV credentials.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-APP-000392-NDM-000309
- Vuln IDs
-
- V-55253
- Rule IDs
-
- SV-69499r1_rule
Checks: C-55873r1_chk
Determine if the network device electronically verifies PIV credentials. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not electronically verify PIV credentials, this is a finding.
Fix: F-60117r1_fix
Configure the network device or its associated authentication server to electronically verify PIV credentials.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-APP-000395-NDM-000310
- Vuln IDs
-
- V-55255
- Rule IDs
-
- SV-69501r2_rule
Checks: C-55875r2_chk
Review the network device configuration to determine if the network device authenticates network management SNMP endpoints before establishing a local, remote, or network connection using bidirectional authentication that is cryptographically based. If the network device does not authenticate the endpoints before establishing a connection using bidirectional authentication that is cryptographically based, this is a finding.
Fix: F-60119r2_fix
Configure the network device to authenticate network management SNMP endpoints before establishing a local, remote, or network connection using bidirectional authentication that is cryptographically based.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000396-NDM-000311
- Vuln IDs
-
- V-55257
- Rule IDs
-
- SV-69503r1_rule
Checks: C-55877r1_chk
Determine if the network device dynamically manages identifiers. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If identifiers are not dynamically managed, this is a finding.
Fix: F-60121r1_fix
Configure the network device or its associated authentication server to dynamically manage identifiers.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-APP-000397-NDM-000312
- Vuln IDs
-
- V-55259
- Rule IDs
-
- SV-69505r1_rule
Checks: C-55879r1_chk
Determine if the network device allows the use of a temporary password for system logons with an immediate change to a permanent password. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the use of a temporary password for system logons with an immediate change to a permanent password is not allowed, this is a finding.
Fix: F-60123r1_fix
Configure the network device or its associated authentication server to allow the use of a temporary password for system logons with an immediate change to a permanent password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-NDM-000313
- Vuln IDs
-
- V-55261
- Rule IDs
-
- SV-69507r1_rule
Checks: C-55881r1_chk
Review the network device configuration to determine if the network device or its associated authentication server prohibits the use of cached authenticators after an organization-defined time period. If cached authenticators are used after an organization-defined time period, this is a finding.
Fix: F-60125r1_fix
Configure the network device or its associated authentication server to prohibit the use of cached authenticators after an organization-defined time period.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000408-NDM-000314
- Vuln IDs
-
- V-55263
- Rule IDs
-
- SV-69509r1_rule
Checks: C-55883r1_chk
Determine if the network device restricts the use of maintenance functions to authorized personnel only. If other personnel can use maintenance functions on the network device, this is a finding.
Fix: F-60127r1_fix
Configure the network device to restrict use of maintenance functions to authorized personnel only.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- SRG-APP-000411-NDM-000330
- Vuln IDs
-
- V-55265
- Rule IDs
-
- SV-69511r1_rule
Checks: C-55885r1_chk
Determine if the network device implements cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. If any such communications are not protected by cryptographic mechanisms, this is a finding.
Fix: F-60129r1_fix
Configure the network device to implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-003123
- Version
- SRG-APP-000412-NDM-000331
- Vuln IDs
-
- V-55267
- Rule IDs
-
- SV-69513r1_rule
Checks: C-55887r1_chk
Determine if the network device implements cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. If any such communications are not protected by cryptographic mechanisms, this is a finding.
Fix: F-60131r1_fix
Configure the network device to implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-NDM-000315
- Vuln IDs
-
- V-55269
- Rule IDs
-
- SV-69515r1_rule
Checks: C-55889r1_chk
Determine if the network device protects against or limits the effects of all known types of DoS attacks by employing organization-defined security safeguards. If the network device does not protect against or limit the effects of all known types of DoS attacks by employing organization-defined security safeguards, this is a finding.
Fix: F-60133r1_fix
Configure the network device to protect against or limit the effects of all known types of DoS attacks by employing organization-defined security safeguards.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000491-NDM-000316
- Vuln IDs
-
- V-55271
- Rule IDs
-
- SV-69517r1_rule
Checks: C-55891r1_chk
Check the network device to determine if organization-defined mandatory access control policies are enforced over all subjects and objects. If it does not use mandatory access control, this is not a finding. If organization-defined mandatory access control policies are not enforced over all subjects and objects, this is a finding.
Fix: F-60135r1_fix
Configure the network device to enforce organization-defined mandatory access control policies over all subjects and objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-NDM-000318
- Vuln IDs
-
- V-55273
- Rule IDs
-
- SV-69519r1_rule
Checks: C-55893r1_chk
Determine if the network device generates audit records when successful/unsuccessful attempts to modify administrator privileges occur. If the network device does not generate audit records when successful/unsuccessful attempts to modify administrator privileges occur, this is a finding.
Fix: F-60137r1_fix
Configure the network device to generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-NDM-000319
- Vuln IDs
-
- V-55275
- Rule IDs
-
- SV-69521r1_rule
Checks: C-55895r1_chk
Determine if the network device generates audit records when successful/unsuccessful attempts to delete administrator privileges occur. If the network device does not generate audit records when successful/unsuccessful attempts to delete administrator privileges occur, this is a finding.
Fix: F-60139r1_fix
Configure the network device to generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-NDM-000320
- Vuln IDs
-
- V-55277
- Rule IDs
-
- SV-69523r1_rule
Checks: C-55897r1_chk
Determine if the network device generates audit records when successful/unsuccessful logon attempts occur. If it does not generate audit records when successful/unsuccessful logon attempts occur, this is a finding.
Fix: F-60141r1_fix
Configure the network device to generate audit records when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-NDM-000321
- Vuln IDs
-
- V-55279
- Rule IDs
-
- SV-69525r1_rule
Checks: C-55899r1_chk
Determine if the network device generates audit records for privileged activities or other system-level access. If the network device does not generate audit records for privileged activities or other system-level access, this is a finding.
Fix: F-60143r1_fix
Configure the network device to generate audit records for privileged activities or other system-level access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-NDM-000322
- Vuln IDs
-
- V-55281
- Rule IDs
-
- SV-69527r1_rule
Checks: C-55901r1_chk
Determine if the network device generates audit records showing starting and ending time for administrator access to the system. If the network device does not generate audit records showing starting and ending time for administrator access to the system, this is a finding.
Fix: F-60145r1_fix
Configure the network device to generate audit records showing starting and ending time for administrator access to the system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-NDM-000323
- Vuln IDs
-
- V-55283
- Rule IDs
-
- SV-69529r1_rule
Checks: C-55903r1_chk
Determine if the network device generates audit records when concurrent logons from different workstations occur. If the network device does not generate audit records when concurrent logons from different workstations occur, this is a finding.
Fix: F-60147r1_fix
Configure the network device to generate audit records when concurrent logons from different workstations occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000509-NDM-000324
- Vuln IDs
-
- V-55285
- Rule IDs
-
- SV-69531r1_rule
Checks: C-55905r1_chk
Determine if the network device generates audit records for all account creations, modifications, disabling, and termination events. If the network device does not generate audit records for all account creations, modifications, disabling, and termination events, this is a finding.
Fix: F-60149r1_fix
Configure the network device to generate audit records for all account creations, modifications, disabling, and termination events.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000515-NDM-000325
- Vuln IDs
-
- V-55287
- Rule IDs
-
- SV-69533r1_rule
Checks: C-55907r1_chk
Check the network device configuration to determine if the device off-loads audit records onto a different system or media than the system being audited. If the device does not off-load audit records onto a different system or media, this is a finding.
Fix: F-60151r1_fix
Configure the network device to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000317
- Vuln IDs
-
- V-55289
- Rule IDs
-
- SV-69535r1_rule
Checks: C-55909r1_chk
Determine if the network device is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it is not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-60153r1_fix
Configure the network device to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000332
- Vuln IDs
-
- V-55291
- Rule IDs
-
- SV-69537r1_rule
Checks: C-55911r1_chk
Determine if the network device notifies the administrator of the number of successful login attempts occurring during an organization-defined time period. This can be accomplished by connecting to the network device and noting if the number of successful login attempts is displayed. If the administrator is not notified of the number of successful login attempts occurring during an organization-defined time period, this is a finding.
Fix: F-60155r1_fix
Configure the network device to notify the administrator of the number of successful login attempts occurring during an organization-defined time period.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000333
- Vuln IDs
-
- V-55293
- Rule IDs
-
- SV-69539r1_rule
Checks: C-55913r1_chk
Determine if the network device uses automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g. CTOs) and IAW with CJCSM 6510.01B. If the network device does not use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g. CTOs) and IAW with CJCSM 6510.01B, this is a finding.
Fix: F-60157r1_fix
Configure the network device to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g. CTOs) and IAW with CJCSM 6510.01B.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000334
- Vuln IDs
-
- V-55295
- Rule IDs
-
- SV-69541r1_rule
Checks: C-55915r1_chk
Determine if the network device generates audit log events for a locally developed list of auditable events. If the network device is not configured to generate audit log events for a locally developed list of auditable events, this is a finding.
Fix: F-60159r1_fix
Configure the network device to generate audit log events for a locally developed list of auditable events.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-000345
- Version
- SRG-APP-000516-NDM-000335
- Vuln IDs
-
- V-55297
- Rule IDs
-
- SV-69543r1_rule
Checks: C-55917r1_chk
Check the network device to determine if only authorized administrators have permissions for changes, deletions and updates on the network device. Inspect the maintenance log to verify changes are being made only by the system administrators. If unauthorized users are allowed to change the hardware or software, this is a finding.
Fix: F-60161r1_fix
Configure the network device to enforce access restrictions associated with changes to the system components.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000336
- Vuln IDs
-
- V-55299
- Rule IDs
-
- SV-69545r2_rule
Checks: C-55919r2_chk
Review the network device configuration to determine if administrative accounts for device management exist on the device. If any administrative accounts other than the emergency administrative account(s) exist on the device, this is a finding.
Fix: F-60163r2_fix
Configure the administrative accounts for device management on the authentication servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000337
- Vuln IDs
-
- V-55301
- Rule IDs
-
- SV-69547r1_rule
Checks: C-55921r1_chk
Review the network device configuration to determine if it employs automated mechanisms to centrally apply authentication settings. If authentication settings are not applied centrally using automated mechanisms, this is a finding.
Fix: F-60165r1_fix
Configure the network device to employ automated mechanisms to centrally apply authentication settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000338
- Vuln IDs
-
- V-55303
- Rule IDs
-
- SV-69549r1_rule
Checks: C-55923r1_chk
Review the network device configuration to determine if it employs automated mechanisms to centrally verify authentication settings. If authentication settings are not verified centrally using automated mechanisms, this is a finding.
Fix: F-60167r1_fix
Configure the network device to employ automated mechanisms to centrally verify authentication settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000339
- Vuln IDs
-
- V-55305
- Rule IDs
-
- SV-69551r1_rule
Checks: C-55925r1_chk
Determine if the network device employs automated mechanisms to detect the addition of any unauthorized components or devices. If the network device does not employ automated mechanisms to detect the addition of unauthorized components or devices, this is a finding.
Fix: F-60169r1_fix
Configure the network device to employ automated mechanisms to detect the addition of unauthorized components or devices.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000340
- Vuln IDs
-
- V-55307
- Rule IDs
-
- SV-69553r1_rule
Checks: C-55927r1_chk
Check the network device to determine if the network device is configured to conduct backups of system level information contained in the information system when changes occur or weekly, whichever is sooner. If the network device does not support the organizational requirements to conduct backups of system-level data according to the defined frequency, this is a finding.
Fix: F-60171r1_fix
Configure the network device to conduct backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000341
- Vuln IDs
-
- V-55309
- Rule IDs
-
- SV-69555r1_rule
Checks: C-55929r1_chk
Review the network device backup configuration to determine if the network device backs up the information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner. If the network device does not backup the information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner, this is a finding.
Fix: F-60173r1_fix
Configure the network device to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000342
- Vuln IDs
-
- V-55311
- Rule IDs
-
- SV-69557r1_rule
Checks: C-55931r1_chk
Determine if the network device employs automated mechanisms to assist in the tracking of security incidents. If such automated mechanisms are not employed, this is a finding.
Fix: F-60175r1_fix
Configure the network device to employ automated mechanisms to assist in the tracking of security incidents.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000344
- Vuln IDs
-
- V-55313
- Rule IDs
-
- SV-69559r1_rule
Checks: C-55933r1_chk
Determine if the network device obtains public key certificates from an appropriate certificate policy through an approved service provider. If the network device does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Fix: F-60177r1_fix
Configure the network device to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-NDM-000244
- Vuln IDs
-
- V-55315
- Rule IDs
-
- SV-69561r1_rule
Checks: C-55937r1_chk
Determine if the network device limits privileges to change the software resident within software libraries. If it does not limit privileges to change the software resident within software libraries, this is a finding.
Fix: F-60181r1_fix
Configure the network device to limit privileges to change the software resident within software libraries.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-APP-000080-NDM-000345
- Vuln IDs
-
- V-63997
- Rule IDs
-
- SV-78487r1_rule
Checks: C-64749r1_chk
Review the configuration of the network device to determine if the vendor default password is present. This may involve showing the passwords configured on the device in the clear.
Fix: F-69925r1_fix
Remove any vendor default passwords from the network device configuration.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001358
- Version
- SRG-APP-000148-NDM-000346
- Vuln IDs
-
- V-64001
- Rule IDs
-
- SV-78491r1_rule
Checks: C-64753r1_chk
Review the network device configuration to determine if an authentication server is defined for gaining administrative access. If so, there must be one account configured locally for an emergency. Verify the username and password for the emergency account is contained within a sealed envelope kept in a safe.
Fix: F-69931r1_fix
Configure the device to only allow one local account for emergency administrative access.
- RMF Control
- Severity
- M
- CCI
- Version
- SRG-APP-000395-NDM-000347
- Vuln IDs
-
- V-68747
- Rule IDs
-
- SV-83339r1_rule
Checks: C-69297r1_chk
Review the network device configuration to determine if the network device authenticates NTP endpoints before establishing a local, remote, or network connection using authentication that is cryptographically based. If the network device does not authenticate Network Time Protocol sources using authentication that is cryptographically based, this is a finding.
Fix: F-74915r1_fix
Configure the network device to authenticate Network Time Protocol sources using authentication that is cryptographically based.