Network Device Management Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V5R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-237779 High check The network device must be configured to use DoD PKI as multi-factor authentication (MFA) for interactive logins.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SRG-APP-000002-NDM-000201
- Vuln IDs
-
- V-202006
- V-55029
- Rule IDs
-
- SV-202006r960738_rule
- SV-69275
Checks: C-2132r381557_chk
Review the network device configuration to see if the device conceals information previously visible on the display with a publicly viewable image during the session lock. This can be demonstrated by the network administrator. If previously visible information is not concealed with a publicly viewable image by the session lock, this is a finding.
Fix: F-2133r381558_fix
Configure the network device to conceal information previously visible on the display with a publicly viewable image during the session lock.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-APP-000003-NDM-000202
- Vuln IDs
-
- V-202007
- V-55031
- Rule IDs
-
- SV-202007r960741_rule
- SV-69277
Checks: C-2133r381560_chk
Review the network device configuration to see if it initiates a session lock after a 15-minute period of inactivity. This may be verified by configuration check or demonstration. If a session lock is not initiated after a 15-minute period of inactivity, this is a finding.
Fix: F-2134r381561_fix
Configure the network device to initiate a session lock after a 15-minute period of inactivity.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-APP-000004-NDM-000203
- Vuln IDs
-
- V-202008
- V-55033
- Rule IDs
-
- SV-202008r984087_rule
- SV-69279
Checks: C-2134r381563_chk
Directly observe the management application or the console; if an administrator cannot directly initiate a session lock from either the management application or the console, this is a finding.
Fix: F-2135r984086_fix
This is an intrinsic capability of the client application or the console. Many terminal emulation clients implement this capability through software flow control or XOFF/XON flow control.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SRG-APP-000005-NDM-000204
- Vuln IDs
-
- V-202009
- V-55035
- Rule IDs
-
- SV-202009r960747_rule
- SV-69281
Checks: C-2135r381566_chk
Review the network device configuration to determine if the device retains session lock until the administrator re-authenticates. This may be verified by configuration check, demonstration, or other validation test results. If the device does not require re-authentication before releasing the session lock, this is a finding.
Fix: F-2136r381567_fix
Configure the network device to retain session lock until the administrator re-authenticates.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-NDM-000208
- Vuln IDs
-
- V-202013
- V-55043
- Rule IDs
-
- SV-202013r960777_rule
- SV-69289
Checks: C-2139r381569_chk
Review the network device configuration to determine if it automatically audits account creation or is configured to use an authentication server which would perform this function. If account creation is not automatically audited, this is a finding.
Fix: F-2140r381570_fix
Configure the network device or its associated authentication server to automatically audit the creation of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-NDM-000209
- Vuln IDs
-
- V-202014
- V-55045
- Rule IDs
-
- SV-202014r960780_rule
- SV-69291
Checks: C-2140r381572_chk
Check the network device to determine if account modification actions are automatically audited. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account modification is not automatically audited, this is a finding.
Fix: F-2141r381573_fix
Configure the network device or its associated authentication server to automatically audit the modification of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-NDM-000210
- Vuln IDs
-
- V-202015
- V-55047
- Rule IDs
-
- SV-202015r960783_rule
- SV-69293
Checks: C-2141r381575_chk
Check the network device to determine if account disabling actions are automatically audited. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account disabling actions are not audited, this is a finding.
Fix: F-2142r381576_fix
Configure the network device or its associated authentication server to automatically audit the disabling of accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-NDM-000211
- Vuln IDs
-
- V-202016
- V-55049
- Rule IDs
-
- SV-202016r960786_rule
- SV-69295
Checks: C-2142r381578_chk
Check the network device to determine if account removal actions are automatically audited. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account removal actions are not automatically audited, this is a finding.
Fix: F-2143r381579_fix
Configure the network device or its associated authentication server to automatically audit the removal of accounts.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- SRG-APP-000033-NDM-000212
- Vuln IDs
-
- V-202017
- V-55051
- Rule IDs
-
- SV-202017r960792_rule
- SV-69297
Checks: C-2143r663931_chk
If the network device is configured to use a AAA service account, and the AAA broker is configured to assign authorization levels based on centralized user account group memberships on behalf of the network device, that will satisfy this objective. Because the responsibility for meeting this objective is transferred to the AAA broker, this requirement is not applicable for the local network device. This requirement may be verified by demonstration or configuration review. Verify the network device is configured to assign appropriate user roles or access levels to authenticated users. This requirement may be verified by demonstration or configuration review. If the network device does not enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level, this is a finding.
Fix: F-2144r663932_fix
Configure the network device to assign appropriate user roles or access levels to authenticated users, or configure the network device to leverage an AAA solution that will satisfy this objective.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-APP-000038-NDM-000213
- Vuln IDs
-
- V-202018
- V-55053
- Rule IDs
-
- SV-202018r960801_rule
- SV-69299
Checks: C-2144r381584_chk
Review the network device configuration to determine if it enforces approved authorizations for controlling the flow of management information within the network device based on information flow control policies. If it does not enforce these approved authorizations, this is a finding.
Fix: F-2145r381585_fix
Configure the network device to enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-NDM-000214
- Vuln IDs
-
- V-202019
- V-55055
- Rule IDs
-
- SV-202019r960840_rule
- SV-69301
Checks: C-2145r381587_chk
Review the device configuration to verify that it enforces the limit of three consecutive invalid logon attempts. If the device is not configured to enforce the limit of three consecutive invalid logon attempts, this is a finding.
Fix: F-2146r381588_fix
Configure the network device to enforce the limit of three consecutive invalid logon attempts during a 15-minute time period.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-APP-000068-NDM-000215
- Vuln IDs
-
- V-202020
- V-55057
- Rule IDs
-
- SV-202020r960843_rule
- SV-69303
Checks: C-2146r381590_chk
Determine if the network device is configured to present a DoD-approved banner that is formatted in accordance with DTM-08-060. If such a banner is not presented, this is a finding. Use the following verbiage for applications that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
Fix: F-2147r381591_fix
Configure the network device to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-APP-000069-NDM-000216
- Vuln IDs
-
- V-202021
- V-55059
- Rule IDs
-
- SV-202021r960846_rule
- SV-69305
Checks: C-2147r381593_chk
Determine if the network device is configured to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access. If the network device does not retain the banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access, this is a finding.
Fix: F-2148r381594_fix
Configure the network device to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-NDM-000220
- Vuln IDs
-
- V-202025
- V-55085
- Rule IDs
-
- SV-202025r960864_rule
- SV-69331
Checks: C-2151r381596_chk
Determine if the network device protects against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. This requires logging all administrator access and configuration activity. This requirement may be verified by demonstration or configuration review. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. (Note that two-factor authentication of administrator access is needed to support this requirement.) If the network device does not protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation, this is a finding.
Fix: F-2152r539618_fix
Configure the network device or its associated authentication server to protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. Examples that support this include configuring the audit log to capture administration login events and configuration changes to the network device.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-NDM-000223
- Vuln IDs
-
- V-202028
- V-55091
- Rule IDs
-
- SV-202028r960885_rule
- SV-69337
Checks: C-2154r381650_chk
Determine if the network device generates audit records when successful/unsuccessful attempts to access privileges occur. If the network device does not generate audit records when successful/unsuccessful attempts to access privileges occur, this is a finding.
Fix: F-2155r381651_fix
Configure the network device to generate audit records when successful/unsuccessful attempts to access privileges occur.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-NDM-000224
- Vuln IDs
-
- V-202029
- V-55093
- Rule IDs
-
- SV-202029r960888_rule
- SV-69339
Checks: C-2155r381653_chk
Determine if the network device initiates session auditing upon startup. This requirement may be verified by validated test results. If the network device does not initiate session auditing upon startup, this is a finding.
Fix: F-2156r381654_fix
Configure the network device to initiate session auditing upon startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-NDM-000225
- Vuln IDs
-
- V-202030
- V-55095
- Rule IDs
-
- SV-202030r960891_rule
- SV-69341
Checks: C-2156r381656_chk
Determine if the network device produces audit log records containing sufficient information to establish what type of event occurred. If the network device does not produce audit log records containing sufficient information to establish what type of event occurred, this is a finding.
Fix: F-2157r381657_fix
Configure the network device to produce audit log records containing sufficient information to establish what type of event occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-NDM-000226
- Vuln IDs
-
- V-202031
- V-55097
- Rule IDs
-
- SV-202031r960894_rule
- SV-69343
Checks: C-2157r381659_chk
Determine if the network device is configured to produce audit records containing information to establish when (date and time) the events occurred. If the network device does not produce audit records containing information to establish when the events occurred, this is a finding.
Fix: F-2158r381660_fix
Configure the network device to produce audit records containing information to establish when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-NDM-000227
- Vuln IDs
-
- V-202032
- V-55099
- Rule IDs
-
- SV-202032r960897_rule
- SV-69345
Checks: C-2158r381662_chk
Determine if the network device is configured to produce audit records containing information to establish where the events occurred. If the network device does not produce audit records containing information to establish where the events occurred, this is a finding.
Fix: F-2159r381663_fix
Configure the network device to produce audit records containing information to establish where the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-NDM-000228
- Vuln IDs
-
- V-202033
- V-55129
- Rule IDs
-
- SV-202033r960900_rule
- SV-69375
Checks: C-2159r381665_chk
Determine if the network device is configured to produce audit records containing information to establish the source (apparent cause) of the event. If the network device does not produce audit records containing information to establish the source of the event, this is a finding.
Fix: F-2160r381666_fix
Configure the network device to produce audit records containing information to establish the source of the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-NDM-000229
- Vuln IDs
-
- V-202034
- V-55137
- Rule IDs
-
- SV-202034r960903_rule
- SV-69383
Checks: C-2160r381668_chk
Determine if the network device is configured to produce audit records that contain information to establish the outcome of the event. If the network device does not produce audit records that contain information to establish the outcome of the event, this is a finding.
Fix: F-2161r381669_fix
Configure the network device to produce audit records that contain information to establish the outcome of the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-NDM-000230
- Vuln IDs
-
- V-202035
- V-55143
- Rule IDs
-
- SV-202035r960906_rule
- SV-69389
Checks: C-2161r381671_chk
Determine if the network device generates audit records containing information that establishes the identity of any individual or process associated with the event. This requirement may be verified by demonstration or validated test results. If the network device does not generate audit records containing information that establishes the identity of any individual or process associated with the event, this is a finding.
Fix: F-2162r381672_fix
Configure the network device to generate audit records containing information that establishes the identity of any individual or process associated with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-NDM-000231
- Vuln IDs
-
- V-202036
- V-55147
- Rule IDs
-
- SV-202036r960909_rule
- SV-69393
Checks: C-2162r381674_chk
Determine if the network device generates audit records containing the full-text recording of privileged commands. If such audit records are not being generated, this is a finding.
Fix: F-2163r381675_fix
Configure the network device to generate audit records containing the full-text recording of privileged commands.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-NDM-000234
- Vuln IDs
-
- V-202039
- V-55165
- Rule IDs
-
- SV-202039r960927_rule
- SV-69411
Checks: C-2165r381680_chk
Determine if the network device uses internal system clocks to generate time stamps for audit records. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not use internal system clocks to generate time stamps for audit records, this is a finding.
Fix: F-2166r381681_fix
Configure the network device to use internal system clocks to generate time stamps for audit records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-NDM-000236
- Vuln IDs
-
- V-202040
- V-55173
- Rule IDs
-
- SV-202040r960933_rule
- SV-69419
Checks: C-2166r381683_chk
Determine if the network device protects audit information from any type of unauthorized modification with such methods as ensuring log files receive the proper file system permissions, limiting log data locations and leveraging user permissions and roles to identify the user accessing the data and the corresponding rights that the user enjoys. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not protect audit information from unauthorized modification, this is a finding.
Fix: F-2167r381684_fix
Configure the network device to protect audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-NDM-000237
- Vuln IDs
-
- V-202041
- V-55179
- Rule IDs
-
- SV-202041r960936_rule
- SV-69425
Checks: C-2167r381686_chk
Determine if the network device protects audit information from any type of unauthorized deletion with such methods as ensuring log files receive the proper file system permissions utilizing file system protections, restricting access to log data and backing up log data to ensure log data is retained, and leveraging user permissions and roles to identify the user accessing the data and the corresponding rights the user enjoys. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not protect audit information from unauthorized deletion, this is a finding.
Fix: F-2168r381687_fix
Configure the network device to protect audit information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-NDM-000238
- Vuln IDs
-
- V-202042
- V-55183
- Rule IDs
-
- SV-202042r960939_rule
- SV-69429
Checks: C-2168r381689_chk
If the network device provides audit tools, check the device to determine if it protects audit tools from unauthorized access. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not protect its audit tools from unauthorized access, this is a finding.
Fix: F-2169r381690_fix
Configure the network device to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-NDM-000239
- Vuln IDs
-
- V-202043
- V-55191
- Rule IDs
-
- SV-202043r960942_rule
- SV-69437
Checks: C-2169r381737_chk
If the network device provides audit tools, check the device to determine if it protects audit tools from unauthorized modification. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not protect its audit tools from unauthorized modification, this is a finding.
Fix: F-2170r381738_fix
Configure the network device to protect audit tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-NDM-000240
- Vuln IDs
-
- V-202044
- V-55205
- Rule IDs
-
- SV-202044r960945_rule
- SV-69451
Checks: C-2170r381740_chk
If the network device provides audit tools, check to see that the network device protects audit tools from unauthorized deletion. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not protect its audit tools from unauthorized deletion, this is a finding.
Fix: F-2171r381741_fix
Configure the network device to protect audit tools from unauthorized deletion.
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- SRG-APP-000131-NDM-000243
- Vuln IDs
-
- V-202047
- V-55219
- Rule IDs
-
- SV-202047r984089_rule
- SV-69465
Checks: C-2173r381746_chk
Determine if the network device prevents the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization, this is a finding.
Fix: F-2174r381747_fix
Configure the network device to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-NDM-000244
- Vuln IDs
-
- V-202048
- V-55315
- Rule IDs
-
- SV-202048r960960_rule
- SV-69561
Checks: C-2174r381749_chk
Determine if the network device limits privileges to change the software resident within software libraries. If it does not limit privileges to change the software resident within software libraries, this is a finding.
Fix: F-2175r381750_fix
Configure the network device to limit privileges to change the software resident within software libraries.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- SRG-APP-000142-NDM-000245
- Vuln IDs
-
- V-202049
- V-55101
- Rule IDs
-
- SV-202049r960966_rule
- SV-69347
Checks: C-2175r381752_chk
Determine if the network device prohibits the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services. If any unnecessary or nonsecure functions are permitted, this is a finding.
Fix: F-2176r381753_fix
Configure the network device to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001358
- Version
- SRG-APP-000148-NDM-000346
- Vuln IDs
-
- V-202051
- V-64001
- Rule IDs
-
- SV-202051r960969_rule
- SV-78491
Checks: C-2177r381755_chk
Review the network device configuration to determine if an account of last resort is configured. Verify default admin and other vendor-provided accounts are disabled, removed, or renamed where possible. Verify the username and password for the account of last resort is contained within a sealed envelope and kept in a safe. If one local account does not exist for use as the account of last resort, this is a finding.
Fix: F-2178r381756_fix
Configure the device to only allow one local account for use as the account of last resort.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000153-NDM-000249
- Vuln IDs
-
- V-202054
- V-55109
- Rule IDs
-
- SV-202054r984091_rule
- SV-69355
Checks: C-2180r984090_chk
Determine if the network device ensures that administrators are authenticated with an individual authenticator prior to using a group authenticator. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not authenticate administrators with an individual authenticator prior to using a group authenticator, this is a finding.
Fix: F-2181r381759_fix
Configure the network device to ensure administrators are authenticated with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000156-NDM-000250
- Vuln IDs
-
- V-202055
- V-55111
- Rule IDs
-
- SV-202055r960993_rule
- SV-69357
Checks: C-2181r381761_chk
Determine if the network device implements replay-resistant authentication mechanisms for network access to privileged accounts. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If the network device does not implement replay-resistant authentication mechanisms for network access to privileged accounts, this is a finding.
Fix: F-2182r381762_fix
Configure the network device to implement replay-resistant authentication mechanisms for network access to privileged accounts.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000164-NDM-000252
- Vuln IDs
-
- V-202057
- V-55115
- Rule IDs
-
- SV-202057r984092_rule
- SV-69361
Checks: C-2183r381764_chk
Determine if the network device or its associated authentication server enforces a minimum 15-character password length. This requirement may be verified by demonstration or configuration review. If the network device or its associated authentication server does not enforce a minimum 15-character password length, this is a finding.
Fix: F-2184r381765_fix
Configure the network device or its associated authentication server to enforce a minimum 15-character password length.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000166-NDM-000254
- Vuln IDs
-
- V-202059
- V-55119
- Rule IDs
-
- SV-202059r984095_rule
- SV-69365
Checks: C-2185r984093_chk
Where passwords are used, confirm that the network device and associated authentication server enforces password complexity by requiring that at least one uppercase character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device and associated authentication server does not require that at least one uppercase character be used in each password, this is a finding.
Fix: F-2186r984094_fix
Configure the network device and associated authentication server to enforce password complexity by requiring that at least one uppercase character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000167-NDM-000255
- Vuln IDs
-
- V-202060
- V-55121
- Rule IDs
-
- SV-202060r984098_rule
- SV-69367
Checks: C-2186r984096_chk
Where passwords are used, confirm that the network device and associated authentication server enforces password complexity by requiring that at least one lowercase character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device and associated authentication server does not require that at least one lowercase character be used in each password, this is a finding.
Fix: F-2187r984097_fix
Configure the network device and associated authentication server to enforce password complexity by requiring that at least one lowercase character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000168-NDM-000256
- Vuln IDs
-
- V-202061
- V-55123
- Rule IDs
-
- SV-202061r984099_rule
- SV-69369
Checks: C-2187r381773_chk
Where passwords are used, confirm that the network device and associated authentication server enforces password complexity by requiring that at least one numeric character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device and associated authentication server does not require that at least one numeric character be used in each password, this is a finding.
Fix: F-2188r381774_fix
Configure the network device and associated authentication server to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000169-NDM-000257
- Vuln IDs
-
- V-202062
- V-55125
- Rule IDs
-
- SV-202062r984100_rule
- SV-69371
Checks: C-2188r381776_chk
Where passwords are used, confirm that the network device and associated authentication server enforces password complexity by requiring that at least one special character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device and associated authentication server does not require that at least one special character be used in each password, this is a finding.
Fix: F-2189r381777_fix
Configure the network device and associated authentication server to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000170-NDM-000329
- Vuln IDs
-
- V-202063
- V-55127
- Rule IDs
-
- SV-202063r984101_rule
- SV-69373
Checks: C-2189r381779_chk
Where passwords are used, confirm the characters are changed in at least eight of the positions within the password. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device and associated authentication server does not require that when a password is changed, the characters are changed in at least eight of the positions within the password, this is a finding.
Fix: F-2190r381780_fix
Configure the network device and associated authentication server to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
- RMF Control
- Severity
- H
- CCI
- CCI-004062
- Version
- SRG-APP-000171-NDM-000258
- Vuln IDs
-
- V-202064
- V-55131
- Rule IDs
-
- SV-202064r984103_rule
- SV-69377
Checks: C-2190r381827_chk
Review the network device’s files using a text editor or a database tool that allows viewing data stored in database tables. Determine if password strings are readable/discernable. Determine if the network device, and any associated authentication servers, enforce only storing cryptographic representations of passwords. Verify that databases, configuration files, and log files have encrypted representations of all passwords, and that no password strings are readable/discernable. Potential locations include the local file system where configurations and events are stored, or in a network device related database table. Also identify if the network device uses the MD5 hashing algorithm to create password hashes. If the network device, or any associated authentication servers, stores unencrypted (clear text) representations of passwords, this is a finding. If the network device uses MD5 hashing algorithm to create password hashes, this is a finding.
Fix: F-2191r984102_fix
Configure the network device, and any associated authentication servers, to store all passwords using cryptographic representations. Configure all associated databases, configuration files, and log files to use only encrypted representations of passwords, and that no password strings are readable/discernable. Potential locations include the local file system where configurations and events are stored, or in a network device-related database table.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-APP-000172-NDM-000259
- Vuln IDs
-
- V-202065
- V-55133
- Rule IDs
-
- SV-202065r961029_rule
- SV-69379
Checks: C-2191r381830_chk
Determine if the network device or its associated authentication server transmits only encrypted representations of passwords. This requirement may be verified by demonstration or configuration review. If the network device or the associated authentication server transmits unencrypted representations of passwords, this is a finding.
Fix: F-2192r381831_fix
Configure the network device or its associated authentication server to transmit only encrypted representations of passwords.
- RMF Control
- IA-6
- Severity
- H
- CCI
- CCI-000206
- Version
- SRG-APP-000178-NDM-000264
- Vuln IDs
-
- V-202071
- V-55149
- Rule IDs
-
- SV-202071r961047_rule
- SV-69395
Checks: C-2197r381833_chk
Determine if the network device obscures feedback of authentication information during the authentication process. This requirement may be verified by demonstration. If the network device does not obscure feedback of authentication information during the authentication process, this is a finding.
Fix: F-2198r381834_fix
Configure the network device to obscure feedback of authentication information during the authentication process.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000179-NDM-000265
- Vuln IDs
-
- V-202072
- V-55153
- Rule IDs
-
- SV-202072r961050_rule
- SV-69399
Checks: C-2198r381836_chk
Determine if the network device uses FIPS 140-2 approved algorithms for authentication to a cryptographic module. If the network device is not configured to use a FIPS-approved authentication algorithm to a cryptographic module, this is a finding.
Fix: F-2199r381837_fix
Configure the network device to use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
- RMF Control
- SC-10
- Severity
- H
- CCI
- CCI-001133
- Version
- SRG-APP-000190-NDM-000267
- Vuln IDs
-
- V-202074
- V-55159
- Rule IDs
-
- SV-202074r961068_rule
- SV-69405
Checks: C-2200r916340_chk
Determine if the network device terminates the connection associated with a device management session at the end of the session or after five minutes of inactivity. This requirement may be verified by demonstration or configuration review. If the network device does not terminate the connection associated with a device management session at the end of the session or after five minutes of inactivity, this is a finding.
Fix: F-2201r916341_fix
Configure the network device to terminate the connection associated with a device management session at the end of the session or after five minutes of inactivity.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-APP-000220-NDM-000268
- Vuln IDs
-
- V-202075
- V-55161
- Rule IDs
-
- SV-202075r961113_rule
- SV-69407
Checks: C-2201r381845_chk
If the network device uses a web interface for device management, determine if the network device invalidates session identifiers upon administrator logout or other session termination. This requirement may be verified by validated test results. If the network device does not invalidate session identifiers upon administrator logout or other session termination, this is a finding.
Fix: F-2202r381846_fix
Configure the network device to invalidate session identifiers upon administrator logout or other session termination.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-NDM-000269
- Vuln IDs
-
- V-202076
- V-55163
- Rule IDs
-
- SV-202076r961116_rule
- SV-69409
Checks: C-2202r381848_chk
If the network device uses a web interface for device management, determine if it recognizes only system-generated session identifiers. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device recognizes other session identifiers than the system-generated ones, this is a finding.
Fix: F-2203r381849_fix
Configure the network device to recognize only system-generated session identifiers.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-NDM-000270
- Vuln IDs
-
- V-202077
- V-55167
- Rule IDs
-
- SV-202077r961119_rule
- SV-69413
Checks: C-2203r381851_chk
If the network device uses a web interface for device management, determine if it generates unique session identifiers using a FIPS 140-2 approved random number generator. This requirement may be verified by validated NIST certification and vendor documentation. If the network device does not use unique session identifiers for its web interface for device management, this is a finding.
Fix: F-2204r381852_fix
Configure the network device to generate unique session identifiers using a FIPS 140-2 approved random number generator.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-001199
- Version
- SRG-APP-000231-NDM-000271
- Vuln IDs
-
- V-202078
- V-55171
- Rule IDs
-
- SV-202078r961128_rule
- SV-69417
Checks: C-2204r381854_chk
List the contents of the network device’s local storage, including any drives supporting removable media (such as flash drives or CDs) and check the file permissions of all files on those drives. If any files allow read or write access by accounts not specifically authorized access or by non-privileged accounts, this is a finding.
Fix: F-2205r381855_fix
Set the file permissions on files on the network device or on removable media used by the device so that only authorized administrators can read or change their contents.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-NDM-000280
- Vuln IDs
-
- V-202085
- V-55197
- Rule IDs
-
- SV-202085r961224_rule
- SV-69443
Checks: C-2211r381857_chk
Review the network device configuration to determine if it is configured to enable a logout for administrator-initiated communication sessions. If the network device is not configured to provide a logout mechanism for these sessions, this is a finding.
Fix: F-2212r381858_fix
Configure the network device to provide a logout capability for administrator-initiated communication sessions.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-APP-000297-NDM-000281
- Vuln IDs
-
- V-202086
- V-55199
- Rule IDs
-
- SV-202086r961227_rule
- SV-69445
Checks: C-2212r381860_chk
This requirement may be verified by demonstration. If an explicit logoff message is not displayed, or provides clear evidence that the session has been terminated, this is a finding.
Fix: F-2213r381861_fix
Configure the network device to display an explicit logoff message to administrators indicating the reliable termination of authenticated communications sessions. This may be a capability the device is inherently capable of.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000317-NDM-000282
- Vuln IDs
-
- V-202087
- V-55201
- Rule IDs
-
- SV-202087r984107_rule
- SV-69447
Checks: C-2213r984106_chk
Determine if the network device terminates shared/group account credentials when members leave the group. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. This requirement is not applicable if the device does not support shared/group credentials. If the network device does not terminate shared/group credentials when members leave the group, this is a finding.
Fix: F-2214r381864_fix
Configure the network device to terminate shared/group account credentials when members leave the group.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-APP-000319-NDM-000283
- Vuln IDs
-
- V-202088
- V-55203
- Rule IDs
-
- SV-202088r961290_rule
- SV-69449
Checks: C-2214r381866_chk
Determine if the network device automatically audits account enabling actions. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If account enabling actions are not automatically audited, this is a finding.
Fix: F-2215r381867_fix
Configure the network device or its associated authentication server to automatically audit account enabling actions.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-APP-000328-NDM-000286
- Vuln IDs
-
- V-202091
- V-55215
- Rule IDs
-
- SV-202091r961317_rule
- SV-69461
Checks: C-2217r381869_chk
Check the network device to determine if organization-defined discretionary access control policies are enforced over defined subjects and objects. If it does not use discretionary access control, this is not a finding. If organization-defined discretionary access control policies are not enforced over defined subjects and objects, this is a finding.
Fix: F-2218r381870_fix
Configure the network device to enforce organization-defined discretionary access control policies over defined subjects and objects.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002169
- Version
- SRG-APP-000329-NDM-000287
- Vuln IDs
-
- V-202092
- V-55217
- Rule IDs
-
- SV-202092r987662_rule
- SV-69463
Checks: C-2218r381917_chk
Determine if the network device enforces role-based access control policy over defined subjects and objects. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. If role-based access control policy is not enforced over defined subjects and objects, this is a finding.
Fix: F-2219r381918_fix
Configure the network device or its associated authentication server to enforce role-based access control policy over defined subjects and objects.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- SRG-APP-000340-NDM-000288
- Vuln IDs
-
- V-202093
- V-55221
- Rule IDs
-
- SV-202093r961353_rule
- SV-69467
Checks: C-2219r381920_chk
Determine if the network device prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not prevent non-privileged users from executing privileged functions, this is a finding.
Fix: F-2220r381921_fix
Configure the network device to prevent non-privileged users from executing privileged functions.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-APP-000343-NDM-000289
- Vuln IDs
-
- V-202094
- V-55067
- Rule IDs
-
- SV-202094r961362_rule
- SV-69313
Checks: C-2220r381923_chk
Determine if the network device audits the execution of privileged functions. This requirement may be verified by demonstration, configuration review, or validated test results. If the network device does not audit the execution of privileged functions, this is a finding.
Fix: F-2221r381924_fix
Configure the network device to audit the execution of privileged functions.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-NDM-000293
- Vuln IDs
-
- V-202098
- V-55075
- Rule IDs
-
- SV-202098r961392_rule
- SV-69321
Checks: C-2224r381929_chk
Determine if the network device allocates audit record storage capacity in accordance with organization-defined audit record storage requirements. This requirement may be verified by configuration review or vendor-provided information. This requirement may be met through use of a properly configured syslog server if the device is configured to use the syslog server. If audit record store capacity is not allocated in accordance with organization-defined audit record storage requirements, this is a finding.
Fix: F-2225r381930_fix
Configure the network device to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-NDM-000295
- Vuln IDs
-
- V-202100
- V-55079
- Rule IDs
-
- SV-202100r961401_rule
- SV-69325
Checks: C-2226r381932_chk
Determine if the network device generates an immediate alert of all audit failure events requiring real-time alerts. This requirement may be verified by configuration review or validated test results. If an immediate alert of all audit failure events requiring real-time alerts is not generated, this is a finding.
Fix: F-2227r381933_fix
Configure the network device to generate an immediate real-time alert of all audit failure events requiring real-time alerts.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-NDM-000299
- Vuln IDs
-
- V-202102
- V-55233
- Rule IDs
-
- SV-202102r961443_rule
- SV-69479
Checks: C-2228r381938_chk
Determine if the network device records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). This requirement may be verified by demonstration or configuration review. If the network device does not record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT), this is a finding.
Fix: F-2229r381939_fix
Configure the network device to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-NDM-000300
- Vuln IDs
-
- V-202103
- V-55235
- Rule IDs
-
- SV-202103r961446_rule
- SV-69481
Checks: C-2229r381941_chk
Determine if the network device records time stamps for audit records that meet a granularity of one second for a minimum degree of precision. This requirement may be verified by demonstration or configuration. If the network device does not record time stamps for audit records that meet a granularity of one second for a minimum degree of precision, this is a finding.
Fix: F-2230r381942_fix
Configure the network device to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- SRG-APP-000378-NDM-000302
- Vuln IDs
-
- V-202105
- V-55239
- Rule IDs
-
- SV-202105r984110_rule
- SV-69485
Checks: C-2231r984109_chk
Determine if the network device prohibits installation of software without explicit privileged status. This requirement may be verified by demonstration or configuration review. If installation of software is not prohibited without explicit privileged status, this is a finding.
Fix: F-2232r381945_fix
Configure the network device to prohibit installation of software without explicit privileged status.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-NDM-000304
- Vuln IDs
-
- V-202106
- V-55243
- Rule IDs
-
- SV-202106r961461_rule
- SV-69489
Checks: C-2232r381947_chk
Determine if the network device enforces access restrictions associated with changes to device configuration. If the network device does not enforce such access restrictions, this is a finding.
Fix: F-2233r381948_fix
Configure the network device to enforce access restrictions associated with changes to device configuration.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- SRG-APP-000381-NDM-000305
- Vuln IDs
-
- V-202107
- V-55245
- Rule IDs
-
- SV-202107r984111_rule
- SV-69491
Checks: C-2233r381950_chk
Determine if the network device audits the enforcement actions used to restrict access associated with changes to the device. This requirement may be verified by demonstration, configuration review or validated test results. If the network device does not audit the enforcement actions used to restrict access associated with changes to the device, this is a finding.
Fix: F-2234r381951_fix
Configure the network device to audit the enforcement actions used to restrict access associated with changes to the device.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-APP-000395-NDM-000310
- Vuln IDs
-
- V-202111
- V-55255
- Rule IDs
-
- SV-202111r961506_rule
- SV-69501
Checks: C-2237r381953_chk
Review the network device configuration to verify SNMP messages are authenticated using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC). If the network device is not configured to authenticate SNMP messages using a FIPS-validated HMAC, this is a finding.
Fix: F-2238r381954_fix
Configure the network device to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-APP-000395-NDM-000347
- Vuln IDs
-
- V-202112
- V-68747
- Rule IDs
-
- SV-202112r961506_rule
- SV-83339
Checks: C-2238r381956_chk
Review the network device configuration to determine if the network device authenticates NTP endpoints before establishing a local, remote, or network connection using authentication that is cryptographically based. If the network device does not authenticate Network Time Protocol sources using authentication that is cryptographically based, this is a finding.
Fix: F-2239r381957_fix
Configure the network device to authenticate Network Time Protocol sources using authentication that is cryptographically based.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-NDM-000313
- Vuln IDs
-
- V-202115
- V-55261
- Rule IDs
-
- SV-202115r961521_rule
- SV-69507
Checks: C-2241r381959_chk
Review the network device configuration to determine if the network device or its associated authentication server prohibits the use of cached authenticators after an organization-defined time period. If cached authenticators are used after an organization-defined time period, this is a finding.
Fix: F-2242r381960_fix
Configure the network device or its associated authentication server to prohibit the use of cached authenticators after an organization-defined time period.
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-002883
- Version
- SRG-APP-000408-NDM-000314
- Vuln IDs
-
- V-202116
- V-55263
- Rule IDs
-
- SV-202116r961545_rule
- SV-69509
Checks: C-2242r382028_chk
Determine if the network device restricts the use of maintenance functions to authorized personnel only. If other personnel can use maintenance functions on the network device, this is a finding.
Fix: F-2243r382029_fix
Configure the network device to restrict use of maintenance functions to authorized personnel only.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-002890
- Version
- SRG-APP-000411-NDM-000330
- Vuln IDs
-
- V-202117
- V-55265
- Rule IDs
-
- SV-202117r961554_rule
- SV-69511
Checks: C-2243r382031_chk
Verify the network device uses FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications. If the network device does not use FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications, this is a finding.
Fix: F-2244r382032_fix
Configure the network device to use FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-003123
- Version
- SRG-APP-000412-NDM-000331
- Vuln IDs
-
- V-202118
- V-55267
- Rule IDs
-
- SV-202118r961557_rule
- SV-69513
Checks: C-2244r382034_chk
Review the network device configuration to determine if cryptographic mechanisms are implemented using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions If the network device is not configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions using a FIPS 140-2 approved algorithm, this is a finding.
Fix: F-2245r382035_fix
Configure the network device to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions using a FIPS 140-2 approved algorithm.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-NDM-000315
- Vuln IDs
-
- V-202119
- V-55269
- Rule IDs
-
- SV-202119r961620_rule
- SV-69515
Checks: C-2245r382037_chk
Determine if the network device protects against or limits the effects of all known types of DoS attacks by employing organization-defined security safeguards. If the network device does not protect against or limit the effects of all known types of DoS attacks by employing organization-defined security safeguards, this is a finding.
Fix: F-2246r382038_fix
Configure the network device to protect against or limit the effects of all known types of DoS attacks by employing organization-defined security safeguards.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-003014
- Version
- SRG-APP-000491-NDM-000316
- Vuln IDs
-
- V-202120
- V-55271
- Rule IDs
-
- SV-202120r987719_rule
- SV-69517
Checks: C-2246r382040_chk
Check the network device to determine if organization-defined mandatory access control policies are enforced over all subjects and objects. If it does not use mandatory access control, this is not a finding. If organization-defined mandatory access control policies are not enforced over all subjects and objects, this is a finding.
Fix: F-2247r382041_fix
Configure the network device to enforce organization-defined mandatory access control policies over all subjects and objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-NDM-000318
- Vuln IDs
-
- V-202121
- V-55273
- Rule IDs
-
- SV-202121r961800_rule
- SV-69519
Checks: C-2247r382043_chk
Determine if the network device generates audit records when successful/unsuccessful attempts to modify administrator privileges occur. If the network device does not generate audit records when successful/unsuccessful attempts to modify administrator privileges occur, this is a finding.
Fix: F-2248r382044_fix
Configure the network device to generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-NDM-000319
- Vuln IDs
-
- V-202122
- V-55275
- Rule IDs
-
- SV-202122r961812_rule
- SV-69521
Checks: C-2248r382046_chk
Determine if the network device generates audit records when successful/unsuccessful attempts to delete administrator privileges occur. If the network device does not generate audit records when successful/unsuccessful attempts to delete administrator privileges occur, this is a finding.
Fix: F-2249r382047_fix
Configure the network device to generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-NDM-000320
- Vuln IDs
-
- V-202123
- V-55277
- Rule IDs
-
- SV-202123r961824_rule
- SV-69523
Checks: C-2249r382049_chk
Determine if the network device generates audit records when successful/unsuccessful logon attempts occur. If it does not generate audit records when successful/unsuccessful logon attempts occur, this is a finding.
Fix: F-2250r382050_fix
Configure the network device to generate audit records when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-NDM-000321
- Vuln IDs
-
- V-202124
- V-55279
- Rule IDs
-
- SV-202124r961827_rule
- SV-69525
Checks: C-2250r382052_chk
Determine if the network device generates audit records for privileged activities or other system-level access. If the network device does not generate audit records for privileged activities or other system-level access, this is a finding.
Fix: F-2251r382053_fix
Configure the network device to generate audit records for privileged activities or other system-level access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-NDM-000322
- Vuln IDs
-
- V-202125
- V-55281
- Rule IDs
-
- SV-202125r961830_rule
- SV-69527
Checks: C-2251r382055_chk
Determine if the network device generates audit records showing starting and ending time for administrator access to the system. If the network device does not generate audit records showing starting and ending time for administrator access to the system, this is a finding.
Fix: F-2252r382056_fix
Configure the network device to generate audit records showing starting and ending time for administrator access to the system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-NDM-000323
- Vuln IDs
-
- V-202126
- V-55283
- Rule IDs
-
- SV-202126r961833_rule
- SV-69529
Checks: C-2252r382058_chk
Determine if the network device generates audit records when concurrent logons from different workstations occur. If the network device does not generate audit records when concurrent logons from different workstations occur, this is a finding.
Fix: F-2253r382059_fix
Configure the network device to generate audit records when concurrent logons from different workstations occur.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000515-NDM-000325
- Vuln IDs
-
- V-202127
- V-55287
- Rule IDs
-
- SV-202127r961860_rule
- SV-69533
Checks: C-2253r382061_chk
Check the network device configuration to determine if the device off-loads audit records onto a different system or media than the system being audited. If the device does not off-load audit records onto a different system or media, this is a finding.
Fix: F-2254r382062_fix
Configure the network device to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000516-NDM-000334
- Vuln IDs
-
- V-202130
- V-55295
- Rule IDs
-
- SV-202130r961863_rule
- SV-69541
Checks: C-2256r382064_chk
Determine if the network device generates audit log events for a locally developed list of auditable events. If the network device is not configured to generate audit log events for a locally developed list of auditable events, this is a finding.
Fix: F-2257r382065_fix
Configure the network device to generate audit log events for a locally developed list of auditable events.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-000345
- Version
- SRG-APP-000516-NDM-000335
- Vuln IDs
-
- V-202131
- V-55297
- Rule IDs
-
- SV-202131r961863_rule
- SV-69543
Checks: C-2257r382067_chk
Check the network device to determine if only authorized administrators have permissions for changes, deletions and updates on the network device. Inspect the maintenance log to verify changes are being made only by the system administrators. If unauthorized users are allowed to change the hardware or software, this is a finding.
Fix: F-2258r382068_fix
Configure the network device to enforce access restrictions associated with changes to the system components.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000370
- Version
- SRG-APP-000516-NDM-000336
- Vuln IDs
-
- V-202132
- V-55299
- Rule IDs
-
- SV-202132r961863_rule
- SV-69545
Checks: C-2258r916109_chk
Review the network device configuration to verify that the device is configured to use at least two authentication servers as primary source for authentication. If the network device is not configured to use at least two authentication servers for the purpose of authenticating users prior to granting administrative access, this is a finding.
Fix: F-2259r916110_fix
Step 1: Configure the network device to use at least two authentication servers. Step 2: Configure the authentication order to use the authentication servers as primary source for authentication. Step 3: Configure all network connections associated with a device management to use the authentication servers for the purpose of login authentication.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000340
- Vuln IDs
-
- V-202136
- V-55307
- Rule IDs
-
- SV-202136r961863_rule
- SV-69553
Checks: C-2262r382073_chk
Review the network device configuration to determine if the device is configured to conduct backups of system-level information contained in the information system when changes occur. If the network device is not configured to conduct backups of system-level data when changes occur, this is a finding.
Fix: F-2263r382074_fix
Configure the network device to conduct backups of system-level information contained in the information system when changes occur.
- RMF Control
- CP-9
- Severity
- M
- CCI
- CCI-000539
- Version
- SRG-APP-000516-NDM-000341
- Vuln IDs
-
- V-202137
- V-55309
- Rule IDs
-
- SV-202137r961863_rule
- SV-69555
Checks: C-2263r382076_chk
Review the network device backup configuration to determine if the network device backs up the information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner. If the network device does not backup the information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner, this is a finding.
Fix: F-2264r382077_fix
Configure the network device to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000344
- Vuln IDs
-
- V-202139
- V-55313
- Rule IDs
-
- SV-202139r961863_rule
- SV-69559
Checks: C-2265r382079_chk
Determine if the network device obtains public key certificates from an appropriate certificate policy through an approved service provider. If the network device does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Fix: F-2266r382080_fix
Configure the network device to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-NDM-000200
- Vuln IDs
-
- V-202140
- V-55027
- Rule IDs
-
- SV-202140r960735_rule
- SV-69273
Checks: C-2091r382082_chk
Review the network device configuration to see if the device limits the number of concurrent sessions to an organization-defined number for all administrator accounts and/or administrator account types. If the network device does not limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type, this is a finding.
Fix: F-2092r382083_fix
Configure the network device to limit the number of concurrent sessions to an organization-defined number for all administrator accounts and/or administrator account types.
- RMF Control
- AU-4
- Severity
- H
- CCI
- CCI-001851
- Version
- SRG-APP-000516-NDM-000350
- Vuln IDs
-
- V-213467
- V-99017
- Rule IDs
-
- SV-213467r961863_rule
- SV-108121
Checks: C-14692r916112_chk
Verify that the network device is configured to send log data to at least two central log servers. If the network device is not configured to send log data to at least two central log servers, this is a finding.
Fix: F-14690r916113_fix
Configure the network device to send log data to at least two central log servers.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000351
- Vuln IDs
-
- V-213468
- V-99019
- Rule IDs
-
- SV-213468r961863_rule
- SV-108123
Checks: C-14693r382088_chk
Verify that the network device is in compliance with this requirement. If the network device is not running an operating system release that is currently supported by the vendor, this is a finding.
Fix: F-14691r382089_fix
Upgrade the network device to an operating system that is supported by the vendor.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-NDM-000317
- Vuln IDs
-
- V-216508
- V-100099
- Rule IDs
-
- SV-216508r961863_rule
- SV-109203
Checks: C-17743r382091_chk
Determine if the network device is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it is not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-4827r391865_fix
Configure the network device to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000765
- Version
- SRG-APP-000149-NDM-000247
- Vuln IDs
-
- V-237779
- Rule IDs
-
- SV-237779r1007840_rule
Checks: C-40989r1007839_chk
Verify the network device is configured to use DoD PKI as MFA for interactive logins. Evidence of successful configuration is usually indicated by a prompt for the user to insert a smartcard. If the smartcard is already inserted, the network device will prompt the user to enter the corresponding PIN which unlocks the certificate keystore on the smartcard. If the network device is not configured to use DoD PKI as MFA for interactive logins, this is a finding. If the PKI authenticated user is not mapped to the effective local user account this is a finding . Note: Alternative MFA solutions for network devices with basic user interfaces (e.g., L2 switch with only SSH access) have been evaluated by the ICAM Configuration Control Board and DoD ICAM Governance Structure. Current alternatives include RSA SecureID tokens and YubiKey U2F/CTAP1 tokens. To use an alternative MFA solution, a business case and risk assessment must be presented to the Authorizing Official (AO) for review and acceptance. AOs may choose to accept the risk of using one of these alternatives in a target environment based on the business case that was presented. If so, it is the responsibility of the AO to determine if the risk should be downgraded to a CAT II or a CAT III based on the risk assessment of the target environment. If DoD PKI is not used but the network device makes use of an alternative FIPS 140-2 compliant, Cryptographic Module Validation Program (CMVP) validated password solution, then this requirement can be downgraded to a CAT III. Note: Other mitigation strategies which have not been evaluated by the DoD PUWG may include the use of one or more industry solutions. One-time password/PIN/passcodes (OTP), one-time URLs, time-based tokens, and biometrics are examples of such solutions. While AOs may choose to accept the risk of using these alternatives on a case-by-case basis, for DoD the risk of using these alternatives should never be mitigated below a CAT II. Note: This requirement is not applicable to the emergency account of last resort nor for service accounts (non-interactive users). Examples of service accounts include remote service brokers such as AAA, syslog, etc.
Fix: F-40948r663935_fix
Configure the network device to use DoD PKI as MFA for interactive logins.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- SRG-APP-000175-NDM-000262
- Vuln IDs
-
- V-237780
- Rule IDs
-
- SV-237780r961038_rule
Checks: C-40990r663937_chk
Verify the network device is configured to validate certificates used for PKI-based authentication using DoD approved OCSP or CRL resources. If the network device is not configured to validate certificates used for PKI-based authentication using DoD approved OCSP or CRL sources, this is a finding. Note: This requirement may be not applicable if the network device is not configured to use DoD PKI as multi-factor authentication for interactive logins. In that scenario, this requirement should be included as part of the business case and discussion with the AO who is required to accept the risk of the alternative solution. However, if alternative DoD or AO approved solutions are employed which still rely on some form of PKI (digital certificates), this requirement should be tailored to configure certificate validation of the accepted solution. An example may be the reinforcement of a list of explicitly allowed, unique per user, session certificates that are both configured on the devices and documented with the ISSO and ISSM (implying that all other certificates are also explicitly forbidden).
Fix: F-40949r663938_fix
Configure the network device to validate certificates used for PKI-based authentication using DoD approved OCSP or CRL sources.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000187
- Version
- SRG-APP-000177-NDM-000263
- Vuln IDs
-
- V-237781
- Rule IDs
-
- SV-237781r961044_rule
Checks: C-40991r663940_chk
If PKI-based authentication is not used as the MFA solution for interactive logins, this requirement is not applicable. If the network device is configured to use a AAA service account, and the AAA broker is configured to map validated certificates to centralized user accounts on behalf of the network device, that will satisfy this objective. Because the responsibility for meeting this objective is transferred to the AAA broker, this requirement is not applicable for the local network device. This requirement may be verified by demonstration or configuration review. Verify the network device is configured to map each validated certificate to a unique, centralized user account for all interactive users. If the network device is not configured to map each validated certificate to a unique, centralized user account for all interactive users, this is a finding. Note: If local user accounts are used on the device, this requirement cannot be met in its entirety and it is a permanent finding. This may be the case if AO’s choose to accept the risk of using local accounts on network devices for small, isolated environments where centralized directory services are not available in the infrastructure or where they are not cost effective to implement and maintain. In such cases, this requirement can be mitigated to a CAT III if the network device is configured to map each validated certificate to a unique, local user account for all interactive users. Note: This requirement is not applicable to the emergency account of last resort nor for service accounts (non-interactive users). Examples of service accounts include remote service brokers such as AAA, syslog, etc.
Fix: F-40950r663941_fix
Configure the network device to use a AAA service account whereby the remote AAA broker will map the validated certificate used for PKI-based authentication to a centrally managed, interactive user account. Alternatively, for organizations who choose to accept the risk and permanent finding, configure the network device to map the validated certificate used for PKI-based authentication to a unique, local, interactive user account.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000457-NDM-000352
- Vuln IDs
-
- V-256777
- V-45401
- Rule IDs
-
- SV-256777r991609_rule
- SV-58231
Checks: C-60452r991549_chk
Obtain evidence that software updates are consistently applied to the network device within the time frame defined for each patch. If such evidence cannot be obtained, or the evidence that is obtained indicates a pattern of noncompliance, this is a finding. If the network device does not install security-relevant updates within the time period directed by the authoritative source, this is a finding.
Fix: F-60395r891337_fix
Institute and adhere to policies and procedures to ensure that patches are consistently applied to the network device within the time allowed.
- RMF Control
- Severity
- M
- CCI
- CCI-003627
- Version
- SRG-APP-000700-NDM-000100
- Vuln IDs
-
- V-264291
- Rule IDs
-
- SV-264291r984114_rule
Checks: C-68204r984112_chk
Verify the network device is configured to disable accounts when the accounts have expired. If the network device is not configured to disable accounts when the accounts have expired, this is a finding.
Fix: F-68112r984113_fix
Configure the network device to disable accounts when the accounts have expired.
- RMF Control
- Severity
- M
- CCI
- CCI-003628
- Version
- SRG-APP-000705-NDM-000110
- Vuln IDs
-
- V-264292
- Rule IDs
-
- SV-264292r984117_rule
Checks: C-68205r984115_chk
Verify the network device is configured to disable accounts when the accounts are no longer associated to a user. If the network device is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Fix: F-68113r984116_fix
Configure the network device to disable accounts when the accounts are no longer associated to a user.
- RMF Control
- Severity
- M
- CCI
- CCI-003831
- Version
- SRG-APP-000795-NDM-000130
- Vuln IDs
-
- V-264293
- Rule IDs
-
- SV-264293r984120_rule
Checks: C-68206r984118_chk
Verify the network device is configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information. If the network device is not configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information, this is a finding.
Fix: F-68114r984119_fix
Configure the network device to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-APP-000820-NDM-000170
- Vuln IDs
-
- V-264294
- Rule IDs
-
- SV-264294r984123_rule
Checks: C-68207r984121_chk
Verify the network device is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the network device is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-68115r984122_fix
Configure the network device to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- Severity
- M
- CCI
- CCI-004047
- Version
- SRG-APP-000825-NDM-000180
- Vuln IDs
-
- V-264295
- Rule IDs
-
- SV-264295r984126_rule
Checks: C-68208r984124_chk
Verify the network device is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. If the network device is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements, this is a finding.
Fix: F-68116r984125_fix
Configure the network device to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- RMF Control
- Severity
- M
- CCI
- CCI-004058
- Version
- SRG-APP-000830-NDM-000190
- Vuln IDs
-
- V-264296
- Rule IDs
-
- SV-264296r984129_rule
Checks: C-68209r984127_chk
Verify the network device is configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency. If the network device is not configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency, this is a finding.
Fix: F-68117r984128_fix
Configure the network device to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004059
- Version
- SRG-APP-000835-NDM-000200
- Vuln IDs
-
- V-264297
- Rule IDs
-
- SV-264297r984132_rule
Checks: C-68210r984130_chk
Verify the network device is configured to update the list of passwords on an organization-defined frequency. If the network device is not configured to update the list of passwords on an organization-defined frequency, this is a finding.
Fix: F-68118r984131_fix
Configure the network device to update the list of passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004060
- Version
- SRG-APP-000840-NDM-000210
- Vuln IDs
-
- V-264298
- Rule IDs
-
- SV-264298r984135_rule
Checks: C-68211r984133_chk
Verify the network device is configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly. If the network device is not configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly, this is a finding.
Fix: F-68119r984134_fix
Configure the network device to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- SRG-APP-000845-NDM-000220
- Vuln IDs
-
- V-264299
- Rule IDs
-
- SV-264299r984138_rule
Checks: C-68212r984136_chk
Verify the network device is configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a). If the network device is not configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a), this is a finding.
Fix: F-68120r984137_fix
Configure the network device to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- RMF Control
- Severity
- M
- CCI
- CCI-004063
- Version
- SRG-APP-000855-NDM-000240
- Vuln IDs
-
- V-264300
- Rule IDs
-
- SV-264300r984141_rule
Checks: C-68213r984139_chk
Verify the network device is configured to require immediate selection of a new password upon account recovery. If the network device is not configured to require immediate selection of a new password upon account recovery, this is a finding.
Fix: F-68121r984140_fix
Configure the network device to require immediate selection of a new password upon account recovery.
- RMF Control
- Severity
- M
- CCI
- CCI-004064
- Version
- SRG-APP-000860-NDM-000250
- Vuln IDs
-
- V-264301
- Rule IDs
-
- SV-264301r984144_rule
Checks: C-68214r984142_chk
Verify the network device is configured to allow user selection of long passwords and passphrases, including spaces and all printable characters. If the network device is not configured to allow user selection of long passwords and passphrases, including spaces and all printable characters, this is a finding.
Fix: F-68122r984143_fix
Configure the network device to allow user selection of long passwords and passphrases, including spaces and all printable characters.
- RMF Control
- Severity
- M
- CCI
- CCI-004065
- Version
- SRG-APP-000865-NDM-000260
- Vuln IDs
-
- V-264302
- Rule IDs
-
- SV-264302r984147_rule
Checks: C-68215r984145_chk
Verify the network device is configured to employ automated tools to assist the user in selecting strong password authenticators. If the network device is not configured to employ automated tools to assist the user in selecting strong password authenticators, this is a finding.
Fix: F-68123r984146_fix
Configure the network device to employ automated tools to assist the user in selecting strong password authenticators.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-APP-000875-NDM-000280
- Vuln IDs
-
- V-264303
- Rule IDs
-
- SV-264303r984150_rule
Checks: C-68216r984148_chk
Verify the network device is configured to implement a local cache of revocation data to support path discovery and validation. If the network device is not configured to implement a local cache of revocation data to support path discovery and validation, this is a finding.
Fix: F-68124r984149_fix
Configure the network device to implement a local cache of revocation data to support path discovery and validation.
- RMF Control
- Severity
- M
- CCI
- CCI-004192
- Version
- SRG-APP-000880-NDM-000290
- Vuln IDs
-
- V-264304
- Rule IDs
-
- SV-264304r984153_rule
Checks: C-68217r984151_chk
Verify the network device is configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths. If the network device is not configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths, this is a finding.
Fix: F-68125r984152_fix
Configure the network device to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
- RMF Control
- Severity
- M
- CCI
- CCI-004909
- Version
- SRG-APP-000910-NDM-000300
- Vuln IDs
-
- V-264305
- Rule IDs
-
- SV-264305r984156_rule
Checks: C-68218r984154_chk
Verify the network device is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If the network device is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix: F-68126r984155_fix
Configure the network device to include only approved trust anchors in trust stores or certificate stores managed by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004910
- Version
- SRG-APP-000915-NDM-000310
- Vuln IDs
-
- V-264306
- Rule IDs
-
- SV-264306r984159_rule
Checks: C-68219r984157_chk
Verify the network device is configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the network device is not configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Fix: F-68127r984158_fix
Configure the network device to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- RMF Control
- Severity
- M
- CCI
- CCI-004922
- Version
- SRG-APP-000920-NDM-000320
- Vuln IDs
-
- V-264307
- Rule IDs
-
- SV-264307r984162_rule
Checks: C-68220r984160_chk
Verify the network device is configured to synchronize system clocks within and between systems or system components. If the network device is not configured to synchronize system clocks within and between systems or system components, this is a finding.
Fix: F-68128r984161_fix
Configure the network device to synchronize system clocks within and between systems or system components.
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- SRG-APP-000925-NDM-000330
- Vuln IDs
-
- V-264308
- Rule IDs
-
- SV-264308r984165_rule
Checks: C-68221r984163_chk
Verify the network device is configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source. If the network device is not configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source, this is a finding.
Fix: F-68129r984164_fix
Configure the network device to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.