kriterion 0.0.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (564) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +2 -0
  3. data/.ruby-version +1 -0
  4. data/.travis.yml +5 -0
  5. data/Dockerfile +18 -0
  6. data/Gemfile +12 -0
  7. data/Gemfile.lock +62 -0
  8. data/LICENSE.txt +21 -0
  9. data/README.md +58 -0
  10. data/Rakefile +6 -0
  11. data/bin/setup +8 -0
  12. data/bin/update_stigs.rb +42 -0
  13. data/criterion.gemspec +31 -0
  14. data/docker-compose.yml +14 -0
  15. data/exe/kriterion +16 -0
  16. data/lib/kriterion.rb +16 -0
  17. data/lib/kriterion/api.rb +27 -0
  18. data/lib/kriterion/backend.rb +13 -0
  19. data/lib/kriterion/backend/mongodb.rb +235 -0
  20. data/lib/kriterion/cli.rb +28 -0
  21. data/lib/kriterion/cli/api.rb +35 -0
  22. data/lib/kriterion/cli/worker.rb +35 -0
  23. data/lib/kriterion/event.rb +36 -0
  24. data/lib/kriterion/item.rb +42 -0
  25. data/lib/kriterion/logs.rb +14 -0
  26. data/lib/kriterion/metrics.rb +22 -0
  27. data/lib/kriterion/object.rb +50 -0
  28. data/lib/kriterion/report.rb +69 -0
  29. data/lib/kriterion/resource.rb +60 -0
  30. data/lib/kriterion/section.rb +32 -0
  31. data/lib/kriterion/standard.rb +65 -0
  32. data/lib/kriterion/version.rb +3 -0
  33. data/lib/kriterion/worker.rb +280 -0
  34. data/standards/cis_red_hat_enterprise_linux_7.json +34 -0
  35. data/standards/stig_a10_networks_adc_alg.json +209 -0
  36. data/standards/stig_a10_networks_adc_ndm.json +233 -0
  37. data/standards/stig_active_directory_domain.json +257 -0
  38. data/standards/stig_active_directory_forest.json +41 -0
  39. data/standards/stig_active_directory_service_2003.json +173 -0
  40. data/standards/stig_active_directory_service_2008.json +167 -0
  41. data/standards/stig_adobe_acrobat_pro_xi.json +167 -0
  42. data/standards/stig_adobe_acrobat_reader_dc_classic_track.json +179 -0
  43. data/standards/stig_adobe_acrobat_reader_dc_continuous_track.json +179 -0
  44. data/standards/stig_adobe_coldfusion_11.json +611 -0
  45. data/standards/stig_airwatch_mdm.json +185 -0
  46. data/standards/stig_aix_5.3.json +3095 -0
  47. data/standards/stig_aix_6.1.json +3047 -0
  48. data/standards/stig_akamai_ksd_service_impact_level_2_alg.json +209 -0
  49. data/standards/stig_akamai_ksd_service_impact_level_2_ndm.json +155 -0
  50. data/standards/stig_android_2.2_dell.json +311 -0
  51. data/standards/stig_apache_2.2_serverwindows.json +347 -0
  52. data/standards/stig_apache_2.2_sitewindows_security_implementation_guide.json +179 -0
  53. data/standards/stig_apache_server_2.0unix.json +341 -0
  54. data/standards/stig_apache_server_2.0windows.json +341 -0
  55. data/standards/stig_apache_server_2.2unix.json +347 -0
  56. data/standards/stig_apache_server_2.2windows.json +347 -0
  57. data/standards/stig_apache_site_2.0unix.json +185 -0
  58. data/standards/stig_apache_site_2.0windows.json +179 -0
  59. data/standards/stig_apache_site_2.2unix.json +185 -0
  60. data/standards/stig_apache_site_2.2windows.json +179 -0
  61. data/standards/stig_apple_ios6.json +341 -0
  62. data/standards/stig_apple_ios_10.json +245 -0
  63. data/standards/stig_apple_ios_11.json +269 -0
  64. data/standards/stig_apple_ios_4_good_mobility_suite_interim_security_configuration_guide_iscg.json +257 -0
  65. data/standards/stig_apple_ios_5.json +329 -0
  66. data/standards/stig_apple_ios_6.json +335 -0
  67. data/standards/stig_apple_ios_6_interim_security_configuration_guide_iscg.json +371 -0
  68. data/standards/stig_apple_ios_7.json +185 -0
  69. data/standards/stig_apple_ios_8_interim_security_configuration_guide.json +251 -0
  70. data/standards/stig_apple_ios_9_interim_security_configuration_guide.json +245 -0
  71. data/standards/stig_apple_os_x_10.10_yosemite_workstation.json +851 -0
  72. data/standards/stig_apple_os_x_10.11.json +725 -0
  73. data/standards/stig_apple_os_x_10.12.json +737 -0
  74. data/standards/stig_apple_os_x_10.8_mountain_lion_workstation.json +1241 -0
  75. data/standards/stig_apple_os_x_10.9_mavericks_workstation.json +809 -0
  76. data/standards/stig_application_layer_gateway_alg_security_requirements_guide_srg.json +911 -0
  77. data/standards/stig_application_layer_gateway_security_requirements_guide.json +911 -0
  78. data/standards/stig_application_security_and_development.json +1745 -0
  79. data/standards/stig_application_security_and_development_checklist.json +959 -0
  80. data/standards/stig_application_security_requirements_guide.json +1961 -0
  81. data/standards/stig_application_server_security_requirements_guide.json +791 -0
  82. data/standards/stig_arcgisserver_10.3.json +143 -0
  83. data/standards/stig_arista_mls_dcs-7000_series_l2s.json +53 -0
  84. data/standards/stig_arista_mls_dcs-7000_series_ndm.json +197 -0
  85. data/standards/stig_arista_mls_dcs-7000_series_rtr.json +143 -0
  86. data/standards/stig_bind_9.x.json +431 -0
  87. data/standards/stig_bind_dns.json +317 -0
  88. data/standards/stig_blackberry_10.2.x_os.json +179 -0
  89. data/standards/stig_blackberry_10_os.json +227 -0
  90. data/standards/stig_blackberry_bes_12.3.x_mdm.json +65 -0
  91. data/standards/stig_blackberry_bes_12.5.x_mdm.json +65 -0
  92. data/standards/stig_blackberry_device_service_6.2.json +425 -0
  93. data/standards/stig_blackberry_enterprise_mobility_server_2.x.json +149 -0
  94. data/standards/stig_blackberry_enterprise_server,_part_1.json +35 -0
  95. data/standards/stig_blackberry_enterprise_server,_part_2.json +155 -0
  96. data/standards/stig_blackberry_enterprise_server,_part_3.json +647 -0
  97. data/standards/stig_blackberry_enterprise_server_version_5.x,_part_1.json +35 -0
  98. data/standards/stig_blackberry_enterprise_server_version_5.x,_part_2.json +155 -0
  99. data/standards/stig_blackberry_enterprise_server_version_5.x,_part_3.json +653 -0
  100. data/standards/stig_blackberry_enterprise_service_v10.1.x_blackberry_device_service.json +317 -0
  101. data/standards/stig_blackberry_enterprise_service_v10.2.x_blackberry_device_service.json +263 -0
  102. data/standards/stig_blackberry_handheld_device.json +125 -0
  103. data/standards/stig_blackberry_os_10.3.x.json +257 -0
  104. data/standards/stig_blackberry_os_7.x.json +107 -0
  105. data/standards/stig_blackberry_os_7.x.x.json +101 -0
  106. data/standards/stig_blackberry_os_version_5-7.json +107 -0
  107. data/standards/stig_blackberry_playbook.json +65 -0
  108. data/standards/stig_blackberry_playbook_os_nea_mode.json +65 -0
  109. data/standards/stig_blackberry_playbook_os_v2.1.json +197 -0
  110. data/standards/stig_blackberry_uem_12.7.json +59 -0
  111. data/standards/stig_bluetoothzigbee.json +35 -0
  112. data/standards/stig_ca_api_gateway_alg.json +497 -0
  113. data/standards/stig_cisco_css_dns.json +71 -0
  114. data/standards/stig_cisco_ios_xe_release_3_ndm.json +395 -0
  115. data/standards/stig_cisco_ios_xe_release_3_rtr.json +149 -0
  116. data/standards/stig_cmd_management_server_policy.json +53 -0
  117. data/standards/stig_commercial_mobile_device_cmd_policy.json +83 -0
  118. data/standards/stig_csfc_campus_wlan_policy_security_implementation_guide.json +95 -0
  119. data/standards/stig_database_security_requirements_guide.json +767 -0
  120. data/standards/stig_dbn-6300_idps.json +107 -0
  121. data/standards/stig_dbn-6300_ndm.json +359 -0
  122. data/standards/stig_defense_switched_network.json +683 -0
  123. data/standards/stig_defense_switched_network_dsn.json +653 -0
  124. data/standards/stig_desktop_applications_general.json +41 -0
  125. data/standards/stig_dns_policy.json +155 -0
  126. data/standards/stig_domain_name_system_dns_security_requirements_guide.json +599 -0
  127. data/standards/stig_draft_aix.json +3503 -0
  128. data/standards/stig_edb_postgres_advanced_server.json +665 -0
  129. data/standards/stig_email_services_policy.json +137 -0
  130. data/standards/stig_exchange_2010_client_access_server.json +179 -0
  131. data/standards/stig_exchange_2010_edge_transport_server.json +389 -0
  132. data/standards/stig_exchange_2010_hub_transport_server.json +269 -0
  133. data/standards/stig_exchange_2010_mailbox_server.json +209 -0
  134. data/standards/stig_f5_big-ip_access_policy_manager_11.x.json +149 -0
  135. data/standards/stig_f5_big-ip_advanced_firewall_manager_11.x.json +41 -0
  136. data/standards/stig_f5_big-ip_application_security_manager_11.x.json +89 -0
  137. data/standards/stig_f5_big-ip_device_management_11.x.json +467 -0
  138. data/standards/stig_f5_big-ip_local_traffic_manager_11.x.json +407 -0
  139. data/standards/stig_final_draft_general_wireless_policy.json +71 -0
  140. data/standards/stig_firewall.json +449 -0
  141. data/standards/stig_firewall_-_cisco.json +449 -0
  142. data/standards/stig_firewall_security_requirements_guide.json +257 -0
  143. data/standards/stig_forescout_counteract_alg.json +83 -0
  144. data/standards/stig_forescout_counteract_ndm.json +239 -0
  145. data/standards/stig_free_space_optics_device.json +143 -0
  146. data/standards/stig_general_mobile_device_policy_non-enterprise_activated.json +113 -0
  147. data/standards/stig_general_mobile_device_technical_non-enterprise_activated.json +59 -0
  148. data/standards/stig_general_purpose_operating_system_srg.json +1199 -0
  149. data/standards/stig_general_wireless_policy.json +71 -0
  150. data/standards/stig_good_mobility_suite_server_android_os.json +203 -0
  151. data/standards/stig_good_mobility_suite_server_apple_ios_4_interim_security_configuration_guide_iscg.json +209 -0
  152. data/standards/stig_good_mobility_suite_server_windows_phone_6.5.json +449 -0
  153. data/standards/stig_goodenterprise_8.x.json +401 -0
  154. data/standards/stig_google_chrome_browser.json +209 -0
  155. data/standards/stig_google_chrome_current_windows.json +215 -0
  156. data/standards/stig_google_chrome_draft.json +281 -0
  157. data/standards/stig_google_chrome_v23_windows.json +275 -0
  158. data/standards/stig_google_chrome_v24_windows.json +263 -0
  159. data/standards/stig_google_chrome_v24_windows_benchmark.json +227 -0
  160. data/standards/stig_google_search_appliance.json +209 -0
  161. data/standards/stig_harris_secnet_11_54.json +89 -0
  162. data/standards/stig_hp-ux_11.23.json +3215 -0
  163. data/standards/stig_hp-ux_11.31.json +3155 -0
  164. data/standards/stig_hp-ux_smse.json +431 -0
  165. data/standards/stig_hpe_3par_storeserv_3.2.x.json +131 -0
  166. data/standards/stig_ibm_datapower_alg.json +401 -0
  167. data/standards/stig_ibm_datapower_network_device_management.json +395 -0
  168. data/standards/stig_ibm_db2_v10.5_luw.json +575 -0
  169. data/standards/stig_ibm_hardware_management_console_hmc.json +221 -0
  170. data/standards/stig_ibm_hardware_management_console_hmc_policies.json +35 -0
  171. data/standards/stig_ibm_maas360_v2.3.x_mdm.json +59 -0
  172. data/standards/stig_ibm_zvm_using_ca_vm:secure.json +473 -0
  173. data/standards/stig_idps_security_requirements_guide_srg.json +1865 -0
  174. data/standards/stig_idsips.json +257 -0
  175. data/standards/stig_iis6_server.json +221 -0
  176. data/standards/stig_iis6_site.json +263 -0
  177. data/standards/stig_iis_7.0_web_server.json +155 -0
  178. data/standards/stig_iis_7.0_web_site.json +299 -0
  179. data/standards/stig_iis_8.5_server.json +293 -0
  180. data/standards/stig_iis_8.5_site.json +347 -0
  181. data/standards/stig_infoblox_7.x_dns.json +419 -0
  182. data/standards/stig_infrastructure_l3_switch.json +599 -0
  183. data/standards/stig_infrastructure_l3_switch_-_cisco.json +659 -0
  184. data/standards/stig_infrastructure_l3_switch_secure_technical_implementation_guide_-_cisco.json +659 -0
  185. data/standards/stig_infrastructure_router.json +479 -0
  186. data/standards/stig_infrastructure_router_-_cisco.json +539 -0
  187. data/standards/stig_infrastructure_router_-_juniper.json +485 -0
  188. data/standards/stig_infrastructure_router__cisco.json +539 -0
  189. data/standards/stig_infrastructure_router__juniper.json +485 -0
  190. data/standards/stig_internet_explorer_8.json +821 -0
  191. data/standards/stig_internet_explorer_9.json +815 -0
  192. data/standards/stig_intrusion_detection_and_prevention_systems_idps_security_requirements_guide.json +371 -0
  193. data/standards/stig_ipsec_vpn_gateway.json +521 -0
  194. data/standards/stig_java_runtime_environment_jre_6_unix.json +65 -0
  195. data/standards/stig_java_runtime_environment_jre_6_win7.json +65 -0
  196. data/standards/stig_java_runtime_environment_jre_6_windows_xp.json +77 -0
  197. data/standards/stig_java_runtime_environment_jre_6_winxp.json +65 -0
  198. data/standards/stig_java_runtime_environment_jre_7_unix.json +65 -0
  199. data/standards/stig_java_runtime_environment_jre_7_win7.json +65 -0
  200. data/standards/stig_java_runtime_environment_jre_7_winxp.json +65 -0
  201. data/standards/stig_java_runtime_environment_jre_version_6_unix.json +77 -0
  202. data/standards/stig_java_runtime_environment_jre_version_6_windows_7.json +77 -0
  203. data/standards/stig_java_runtime_environment_jre_version_6_windows_xp.json +65 -0
  204. data/standards/stig_java_runtime_environment_jre_version_7_unix.json +77 -0
  205. data/standards/stig_java_runtime_environment_jre_version_7_windows_7.json +77 -0
  206. data/standards/stig_java_runtime_environment_jre_version_7_winxp.json +77 -0
  207. data/standards/stig_java_runtime_environment_jre_version_8_unix.json +107 -0
  208. data/standards/stig_java_runtime_environment_jre_version_8_windows.json +107 -0
  209. data/standards/stig_jboss_eap_6.3.json +413 -0
  210. data/standards/stig_juniper_srx_sg_alg.json +155 -0
  211. data/standards/stig_juniper_srx_sg_idps.json +179 -0
  212. data/standards/stig_juniper_srx_sg_ndm.json +443 -0
  213. data/standards/stig_juniper_srx_sg_vpn.json +185 -0
  214. data/standards/stig_keyboard_video_and_mouse_switch.json +269 -0
  215. data/standards/stig_l3_kov-26_talon_wireless_role.json +77 -0
  216. data/standards/stig_layer_2_switch.json +347 -0
  217. data/standards/stig_layer_2_switch_-_cisco.json +365 -0
  218. data/standards/stig_lg_android_5.x_interim_security_configuration_guide.json +245 -0
  219. data/standards/stig_lg_android_6.x.json +281 -0
  220. data/standards/stig_mac_osx_10.6_workstation.json +1319 -0
  221. data/standards/stig_mac_osx_10.6_workstation_draft.json +1319 -0
  222. data/standards/stig_mainframe_product_security_requirements_guide.json +1115 -0
  223. data/standards/stig_mcafee_application_control_7.x.json +203 -0
  224. data/standards/stig_mcafee_move_2.63.6.1_multi-platform_client.json +149 -0
  225. data/standards/stig_mcafee_move_2.63.6.1_multi-platform_oss.json +101 -0
  226. data/standards/stig_mcafee_move_2.6_multi-platform_client.json +149 -0
  227. data/standards/stig_mcafee_move_2.6_multi-platform_oss.json +101 -0
  228. data/standards/stig_mcafee_move_3.6.1_multi-platform_client.json +149 -0
  229. data/standards/stig_mcafee_move_3.6.1_multi-platform_oss.json +101 -0
  230. data/standards/stig_mcafee_move_agentless_3.03.6.1_security_virtual_appliance.json +167 -0
  231. data/standards/stig_mcafee_move_agentless_3.0_security_virtual_appliance.json +167 -0
  232. data/standards/stig_mcafee_move_agentless_3.0_vsel_1.9sva.json +203 -0
  233. data/standards/stig_mcafee_move_agentless_3.6.1_security_virtual_appliance.json +167 -0
  234. data/standards/stig_mcafee_move_av_agentless_4.5.json +155 -0
  235. data/standards/stig_mcafee_move_av_multi-platform_4.5.json +215 -0
  236. data/standards/stig_mcafee_virusscan_8.8_local_client.json +533 -0
  237. data/standards/stig_mcafee_virusscan_8.8_managed_client.json +533 -0
  238. data/standards/stig_mcafee_vsel_1.92.0_local_client.json +245 -0
  239. data/standards/stig_mcafee_vsel_1.92.0_managed_client.json +239 -0
  240. data/standards/stig_mdm_server_policy.json +47 -0
  241. data/standards/stig_microsoft_access_2003.json +47 -0
  242. data/standards/stig_microsoft_access_2007.json +77 -0
  243. data/standards/stig_microsoft_access_2010.json +119 -0
  244. data/standards/stig_microsoft_access_2013.json +113 -0
  245. data/standards/stig_microsoft_access_2016.json +107 -0
  246. data/standards/stig_microsoft_dot_net_framework_4.0.json +101 -0
  247. data/standards/stig_microsoft_excel_2003.json +47 -0
  248. data/standards/stig_microsoft_excel_2007.json +155 -0
  249. data/standards/stig_microsoft_excel_2010.json +287 -0
  250. data/standards/stig_microsoft_excel_2013.json +293 -0
  251. data/standards/stig_microsoft_excel_2016.json +257 -0
  252. data/standards/stig_microsoft_exchange_2010_client_access_server_role.json +71 -0
  253. data/standards/stig_microsoft_exchange_2010_core_server.json +47 -0
  254. data/standards/stig_microsoft_exchange_2010_edge_transport_server_role.json +233 -0
  255. data/standards/stig_microsoft_exchange_2010_hub_transport_server_role.json +125 -0
  256. data/standards/stig_microsoft_exchange_2010_mailbox_server_role.json +107 -0
  257. data/standards/stig_microsoft_exchange_server_2003.json +647 -0
  258. data/standards/stig_microsoft_groove_2013.json +71 -0
  259. data/standards/stig_microsoft_ie_version_6.json +599 -0
  260. data/standards/stig_microsoft_ie_version_7.json +749 -0
  261. data/standards/stig_microsoft_infopath_2003.json +41 -0
  262. data/standards/stig_microsoft_infopath_2007.json +167 -0
  263. data/standards/stig_microsoft_infopath_2010.json +155 -0
  264. data/standards/stig_microsoft_infopath_2013.json +149 -0
  265. data/standards/stig_microsoft_internet_explorer_10.json +857 -0
  266. data/standards/stig_microsoft_internet_explorer_11.json +839 -0
  267. data/standards/stig_microsoft_internet_explorer_9.json +821 -0
  268. data/standards/stig_microsoft_lync_2013.json +29 -0
  269. data/standards/stig_microsoft_office_system_2007.json +221 -0
  270. data/standards/stig_microsoft_office_system_2010.json +233 -0
  271. data/standards/stig_microsoft_office_system_2013.json +293 -0
  272. data/standards/stig_microsoft_office_system_2016.json +131 -0
  273. data/standards/stig_microsoft_onedrivebusiness_2016.json +89 -0
  274. data/standards/stig_microsoft_onenote_2010.json +77 -0
  275. data/standards/stig_microsoft_onenote_2013.json +71 -0
  276. data/standards/stig_microsoft_onenote_2016.json +71 -0
  277. data/standards/stig_microsoft_outlook_2003.json +65 -0
  278. data/standards/stig_microsoft_outlook_2007.json +479 -0
  279. data/standards/stig_microsoft_outlook_2010.json +515 -0
  280. data/standards/stig_microsoft_outlook_2013.json +497 -0
  281. data/standards/stig_microsoft_outlook_2016.json +359 -0
  282. data/standards/stig_microsoft_powerpoint_2003.json +47 -0
  283. data/standards/stig_microsoft_powerpoint_2007.json +131 -0
  284. data/standards/stig_microsoft_powerpoint_2010.json +191 -0
  285. data/standards/stig_microsoft_powerpoint_2013.json +251 -0
  286. data/standards/stig_microsoft_powerpoint_2016.json +233 -0
  287. data/standards/stig_microsoft_project_2010.json +83 -0
  288. data/standards/stig_microsoft_project_2013.json +95 -0
  289. data/standards/stig_microsoft_project_2016.json +95 -0
  290. data/standards/stig_microsoft_publisher_2010.json +107 -0
  291. data/standards/stig_microsoft_publisher_2013.json +101 -0
  292. data/standards/stig_microsoft_publisher_2016.json +101 -0
  293. data/standards/stig_microsoft_sharepoint_designer_2013.json +71 -0
  294. data/standards/stig_microsoft_skypebusiness_2016.json +29 -0
  295. data/standards/stig_microsoft_sql_server_2005_database.json +167 -0
  296. data/standards/stig_microsoft_sql_server_2005_instance.json +1001 -0
  297. data/standards/stig_microsoft_sql_server_2012_database.json +179 -0
  298. data/standards/stig_microsoft_sql_server_2012_database_instance.json +929 -0
  299. data/standards/stig_microsoft_visio_2013.json +89 -0
  300. data/standards/stig_microsoft_visio_2016.json +89 -0
  301. data/standards/stig_microsoft_windows_10_mobile.json +215 -0
  302. data/standards/stig_microsoft_windows_2008_server_domain_name_system.json +269 -0
  303. data/standards/stig_microsoft_windows_2012_server_domain_name_system.json +551 -0
  304. data/standards/stig_microsoft_windows_phone_8.1.json +161 -0
  305. data/standards/stig_microsoft_windows_server_2012_domain_controller.json +2633 -0
  306. data/standards/stig_microsoft_windows_server_2012_member_server.json +2411 -0
  307. data/standards/stig_microsoft_word_2003.json +47 -0
  308. data/standards/stig_microsoft_word_2007.json +119 -0
  309. data/standards/stig_microsoft_word_2010.json +221 -0
  310. data/standards/stig_microsoft_word_2013.json +221 -0
  311. data/standards/stig_microsoft_word_2016.json +215 -0
  312. data/standards/stig_mobile_application_management_mam_server.json +95 -0
  313. data/standards/stig_mobile_application_security_requirements_guide.json +233 -0
  314. data/standards/stig_mobile_device_integrity_scanning_mdis_server.json +119 -0
  315. data/standards/stig_mobile_device_management_mdm_server.json +125 -0
  316. data/standards/stig_mobile_device_manager_security_requirements_guide.json +2555 -0
  317. data/standards/stig_mobile_email_management_mem_server.json +197 -0
  318. data/standards/stig_mobile_operating_system_security_requirements_guide.json +1943 -0
  319. data/standards/stig_mobile_policy.json +35 -0
  320. data/standards/stig_mobile_policy_security_requirements_guide.json +437 -0
  321. data/standards/stig_mobileiron_core_v9.x_mdm.json +89 -0
  322. data/standards/stig_mobility_policy.json +65 -0
  323. data/standards/stig_mozilla_firefox.json +161 -0
  324. data/standards/stig_ms_exchange_2013_client_access_server.json +209 -0
  325. data/standards/stig_ms_exchange_2013_edge_transport_server.json +443 -0
  326. data/standards/stig_ms_exchange_2013_mailbox_server.json +437 -0
  327. data/standards/stig_ms_sharepoint_2010.json +269 -0
  328. data/standards/stig_ms_sharepoint_2013.json +245 -0
  329. data/standards/stig_ms_sharepoint_designer_2013.json +71 -0
  330. data/standards/stig_ms_sql_server_2014_database.json +263 -0
  331. data/standards/stig_ms_sql_server_2014_instance.json +575 -0
  332. data/standards/stig_ms_sql_server_2016_database.json +185 -0
  333. data/standards/stig_ms_sql_server_2016_instance.json +731 -0
  334. data/standards/stig_ms_windows_defender_antivirus.json +257 -0
  335. data/standards/stig_multifunction_device_and_network_printers.json +131 -0
  336. data/standards/stig_network_device_management_security_requirements_guide.json +863 -0
  337. data/standards/stig_network_devices.json +389 -0
  338. data/standards/stig_network_infrastructure_policy.json +455 -0
  339. data/standards/stig_network_security_requirements_guide.json +1961 -0
  340. data/standards/stig_operating_system_security_requirements_guide.json +1961 -0
  341. data/standards/stig_oracle_10_database_installation.json +527 -0
  342. data/standards/stig_oracle_10_database_instance.json +569 -0
  343. data/standards/stig_oracle_11_database_installation.json +527 -0
  344. data/standards/stig_oracle_11_database_instance.json +551 -0
  345. data/standards/stig_oracle_database_10g_installation.json +527 -0
  346. data/standards/stig_oracle_database_10g_instance.json +581 -0
  347. data/standards/stig_oracle_database_11.2g.json +1229 -0
  348. data/standards/stig_oracle_database_11g_installation.json +527 -0
  349. data/standards/stig_oracle_database_11g_instance.json +575 -0
  350. data/standards/stig_oracle_database_12c.json +1217 -0
  351. data/standards/stig_oracle_http_server_12.1.3.json +1703 -0
  352. data/standards/stig_oracle_linux_5.json +3431 -0
  353. data/standards/stig_oracle_linux_6.json +1583 -0
  354. data/standards/stig_oracle_weblogic_server_12c.json +443 -0
  355. data/standards/stig_palo_alto_networks_alg.json +311 -0
  356. data/standards/stig_palo_alto_networks_idps.json +185 -0
  357. data/standards/stig_palo_alto_networks_ndm.json +251 -0
  358. data/standards/stig_pda.json +83 -0
  359. data/standards/stig_pdasmartphone.json +95 -0
  360. data/standards/stig_perimeter_l3_switch.json +923 -0
  361. data/standards/stig_perimeter_l3_switch_-_cisco.json +1001 -0
  362. data/standards/stig_perimeter_router.json +803 -0
  363. data/standards/stig_perimeter_router_cisco.json +881 -0
  364. data/standards/stig_perimeter_router_juniper.json +803 -0
  365. data/standards/stig_postgresql_9.x.json +677 -0
  366. data/standards/stig_red_hat_enterprise_linux_5.json +3437 -0
  367. data/standards/stig_red_hat_enterprise_linux_6.json +1565 -0
  368. data/standards/stig_red_hat_enterprise_linux_7.json +1451 -0
  369. data/standards/stig_remote_access_policy.json +317 -0
  370. data/standards/stig_removable_storage_and_external_connection_technologies.json +143 -0
  371. data/standards/stig_removable_storage_and_external_connections.json +137 -0
  372. data/standards/stig_rfid_scanner.json +35 -0
  373. data/standards/stig_rfid_workstation.json +23 -0
  374. data/standards/stig_riverbed_steelhead_cx_v8_alg.json +83 -0
  375. data/standards/stig_riverbed_steelhead_cx_v8_ndm.json +371 -0
  376. data/standards/stig_router_security_requirements_guide.json +575 -0
  377. data/standards/stig_samsung_android_os_5_with_knox_2.0.json +365 -0
  378. data/standards/stig_samsung_android_os_6_with_knox_2.x.json +377 -0
  379. data/standards/stig_samsung_android_os_7_with_knox_2.x.json +443 -0
  380. data/standards/stig_samsung_android_with_knox_1.x.json +293 -0
  381. data/standards/stig_samsung_android_with_knox_2.x.json +371 -0
  382. data/standards/stig_samsung_knox_android_1.0.json +167 -0
  383. data/standards/stig_sharepoint_2010.json +269 -0
  384. data/standards/stig_sharepoint_2013.json +245 -0
  385. data/standards/stig_smartphone_policy.json +131 -0
  386. data/standards/stig_solaris_10_sparc.json +3029 -0
  387. data/standards/stig_solaris_10_x86.json +3065 -0
  388. data/standards/stig_solaris_11_sparc.json +1427 -0
  389. data/standards/stig_solaris_11_x86.json +1421 -0
  390. data/standards/stig_solaris_9_sparc.json +2915 -0
  391. data/standards/stig_solaris_9_x86.json +2915 -0
  392. data/standards/stig_sun_ray_4.json +185 -0
  393. data/standards/stig_sun_ray_4_policy.json +77 -0
  394. data/standards/stig_suse_linux_enterprise_server_v11system_z.json +3311 -0
  395. data/standards/stig_symantec_endpoint_protection_12.1_local_client_antivirus.json +689 -0
  396. data/standards/stig_symantec_endpoint_protection_12.1_managed_client_antivirus.json +695 -0
  397. data/standards/stig_tanium_6.5.json +461 -0
  398. data/standards/stig_tanium_7.0.json +803 -0
  399. data/standards/stig_test_and_development_zone_a.json +167 -0
  400. data/standards/stig_test_and_development_zone_b.json +179 -0
  401. data/standards/stig_test_and_development_zone_c.json +143 -0
  402. data/standards/stig_test_and_development_zone_d.json +143 -0
  403. data/standards/stig_traditional_security.json +917 -0
  404. data/standards/stig_unix_srg.json +3287 -0
  405. data/standards/stig_video_services_policy.json +497 -0
  406. data/standards/stig_video_teleconference.json +47 -0
  407. data/standards/stig_video_teleconference_vtc.json +12 -0
  408. data/standards/stig_vmware_esx_3_policy.json +155 -0
  409. data/standards/stig_vmware_esx_3_server.json +3791 -0
  410. data/standards/stig_vmware_esx_3_virtual_center.json +257 -0
  411. data/standards/stig_vmware_esx_3_virtual_machine.json +53 -0
  412. data/standards/stig_vmware_esxi_server_5.0.json +809 -0
  413. data/standards/stig_vmware_esxi_v5.json +5177 -0
  414. data/standards/stig_vmware_esxi_version_5_virtual_machine.json +317 -0
  415. data/standards/stig_vmware_nsx_distributed_firewall.json +83 -0
  416. data/standards/stig_vmware_nsx_distributed_logical_router.json +35 -0
  417. data/standards/stig_vmware_nsx_manager.json +191 -0
  418. data/standards/stig_vmware_vcenter_server.json +179 -0
  419. data/standards/stig_vmware_vcenter_server_version_5.json +149 -0
  420. data/standards/stig_vmware_vsphere_esxi_6.0.json +659 -0
  421. data/standards/stig_vmware_vsphere_vcenter_server_version_6.json +311 -0
  422. data/standards/stig_vmware_vsphere_virtual_machine_version_6.json +269 -0
  423. data/standards/stig_voice_and_video_over_internet_protocol_vvoip_policy.json +407 -0
  424. data/standards/stig_voice_video_endpoint_security_requirements_guide.json +395 -0
  425. data/standards/stig_voice_video_services_policy.json +671 -0
  426. data/standards/stig_voice_video_session_management_security_requirements_guide.json +329 -0
  427. data/standards/stig_voicevideo_over_internet_protocol.json +419 -0
  428. data/standards/stig_voicevideo_over_internet_protocol_vvoip.json +263 -0
  429. data/standards/stig_voicevideo_services_policy.json +569 -0
  430. data/standards/stig_web_policy.json +95 -0
  431. data/standards/stig_web_server.json +317 -0
  432. data/standards/stig_web_server_security_requirements_guide.json +587 -0
  433. data/standards/stig_win2k3_audit.json +761 -0
  434. data/standards/stig_win2k8_audit.json +1085 -0
  435. data/standards/stig_win2k8_r2_audit.json +1637 -0
  436. data/standards/stig_win7_audit.json +1613 -0
  437. data/standards/stig_windows_10.json +1691 -0
  438. data/standards/stig_windows_2003_domain_controller.json +893 -0
  439. data/standards/stig_windows_2003_member_server.json +845 -0
  440. data/standards/stig_windows_2008_domain_controller.json +1475 -0
  441. data/standards/stig_windows_2008_member_server.json +1301 -0
  442. data/standards/stig_windows_7.json +1781 -0
  443. data/standards/stig_windows_8.json +2399 -0
  444. data/standards/stig_windows_88.1.json +2273 -0
  445. data/standards/stig_windows_8_8.1.json +2297 -0
  446. data/standards/stig_windows_defender_antivirus.json +239 -0
  447. data/standards/stig_windows_dns.json +185 -0
  448. data/standards/stig_windows_firewall_with_advanced_security.json +137 -0
  449. data/standards/stig_windows_paw.json +155 -0
  450. data/standards/stig_windows_phone_6.5_with_good_mobility_suite.json +65 -0
  451. data/standards/stig_windows_server_2008_r2_domain_controller.json +1961 -0
  452. data/standards/stig_windows_server_2008_r2_member_server.json +1745 -0
  453. data/standards/stig_windows_server_20122012_r2_domain_controller.json +2255 -0
  454. data/standards/stig_windows_server_20122012_r2_member_server.json +2045 -0
  455. data/standards/stig_windows_server_2012_2012_r2_domain_controller.json +2279 -0
  456. data/standards/stig_windows_server_2012_2012_r2_member_server.json +2075 -0
  457. data/standards/stig_windows_server_2012_domain_controller.json +2471 -0
  458. data/standards/stig_windows_server_2012_member_server.json +2249 -0
  459. data/standards/stig_windows_server_2016.json +1661 -0
  460. data/standards/stig_windows_vista.json +1517 -0
  461. data/standards/stig_windows_xp.json +893 -0
  462. data/standards/stig_wireless_keyboard_and_mouse.json +23 -0
  463. data/standards/stig_wireless_management_server_policy.json +53 -0
  464. data/standards/stig_wireless_remote_access_policy_security_implementation_guide.json +29 -0
  465. data/standards/stig_wlan_access_point_enclave-niprnet_connected.json +227 -0
  466. data/standards/stig_wlan_access_point_internet_gateway_only_connection.json +209 -0
  467. data/standards/stig_wlan_access_point_policy.json +17 -0
  468. data/standards/stig_wlan_authentication_server.json +29 -0
  469. data/standards/stig_wlan_bridge.json +209 -0
  470. data/standards/stig_wlan_client.json +65 -0
  471. data/standards/stig_wlan_controller.json +215 -0
  472. data/standards/stig_wlan_ids_sensorserver.json +23 -0
  473. data/standards/stig_wman_access_point.json +263 -0
  474. data/standards/stig_wman_bridge.json +209 -0
  475. data/standards/stig_wman_subscriber.json +65 -0
  476. data/standards/stig_zos_acf2.json +1451 -0
  477. data/standards/stig_zos_bmc_control-dacf2.json +53 -0
  478. data/standards/stig_zos_bmc_control-dracf.json +59 -0
  479. data/standards/stig_zos_bmc_control-dtss.json +65 -0
  480. data/standards/stig_zos_bmc_control-macf2.json +59 -0
  481. data/standards/stig_zos_bmc_control-mracf.json +65 -0
  482. data/standards/stig_zos_bmc_control-mrestartacf2.json +23 -0
  483. data/standards/stig_zos_bmc_control-mrestartracf.json +23 -0
  484. data/standards/stig_zos_bmc_control-mrestarttss.json +23 -0
  485. data/standards/stig_zos_bmc_control-mtss.json +71 -0
  486. data/standards/stig_zos_bmc_control-oacf2.json +53 -0
  487. data/standards/stig_zos_bmc_control-oracf.json +59 -0
  488. data/standards/stig_zos_bmc_control-otss.json +65 -0
  489. data/standards/stig_zos_bmc_ioaacf2.json +53 -0
  490. data/standards/stig_zos_bmc_ioaracf.json +59 -0
  491. data/standards/stig_zos_bmc_ioatss.json +65 -0
  492. data/standards/stig_zos_bmc_mainviewzosacf2.json +47 -0
  493. data/standards/stig_zos_bmc_mainviewzosracf.json +53 -0
  494. data/standards/stig_zos_bmc_mainviewzostss.json +59 -0
  495. data/standards/stig_zos_ca_1_tape_managementacf2.json +65 -0
  496. data/standards/stig_zos_ca_1_tape_managementracf.json +77 -0
  497. data/standards/stig_zos_ca_1_tape_managementtss.json +77 -0
  498. data/standards/stig_zos_ca_auditoracf2.json +29 -0
  499. data/standards/stig_zos_ca_auditorracf.json +29 -0
  500. data/standards/stig_zos_ca_auditortss.json +29 -0
  501. data/standards/stig_zos_ca_common_servicesacf2.json +23 -0
  502. data/standards/stig_zos_ca_common_servicesracf.json +29 -0
  503. data/standards/stig_zos_ca_common_servicestss.json +29 -0
  504. data/standards/stig_zos_ca_micsacf2.json +23 -0
  505. data/standards/stig_zos_ca_micsracf.json +23 -0
  506. data/standards/stig_zos_ca_micstss.json +23 -0
  507. data/standards/stig_zos_ca_mimacf2.json +41 -0
  508. data/standards/stig_zos_ca_mimracf.json +47 -0
  509. data/standards/stig_zos_ca_mimtss.json +47 -0
  510. data/standards/stig_zos_ca_vtapeacf2.json +29 -0
  511. data/standards/stig_zos_ca_vtaperacf.json +35 -0
  512. data/standards/stig_zos_ca_vtapetss.json +35 -0
  513. data/standards/stig_zos_catalog_solutionsacf2.json +23 -0
  514. data/standards/stig_zos_catalog_solutionsracf.json +23 -0
  515. data/standards/stig_zos_catalog_solutionstss.json +23 -0
  516. data/standards/stig_zos_clsupersessionacf2.json +53 -0
  517. data/standards/stig_zos_clsupersessionracf.json +65 -0
  518. data/standards/stig_zos_clsupersessiontss.json +71 -0
  519. data/standards/stig_zos_compuware_abend-aidacf2.json +47 -0
  520. data/standards/stig_zos_compuware_abend-aidracf.json +53 -0
  521. data/standards/stig_zos_compuware_abend-aidtss.json +53 -0
  522. data/standards/stig_zos_cssmtpacf2.json +23 -0
  523. data/standards/stig_zos_cssmtpracf.json +29 -0
  524. data/standards/stig_zos_cssmtptss.json +29 -0
  525. data/standards/stig_zos_fdracf2.json +23 -0
  526. data/standards/stig_zos_fdrracf.json +23 -0
  527. data/standards/stig_zos_fdrtss.json +23 -0
  528. data/standards/stig_zos_hcdacf2.json +29 -0
  529. data/standards/stig_zos_hcdracf.json +29 -0
  530. data/standards/stig_zos_hcdtss.json +29 -0
  531. data/standards/stig_zos_ibm_cics_transaction_serveracf2.json +17 -0
  532. data/standards/stig_zos_ibm_cics_transaction_serverracf.json +17 -0
  533. data/standards/stig_zos_ibm_cics_transaction_servertss.json +17 -0
  534. data/standards/stig_zos_ibm_health_checkeracf2.json +23 -0
  535. data/standards/stig_zos_ibm_health_checkerracf.json +29 -0
  536. data/standards/stig_zos_ibm_health_checkertss.json +29 -0
  537. data/standards/stig_zos_ibm_system_display_and_search_facility_sdsfacf2.json +53 -0
  538. data/standards/stig_zos_ibm_system_display_and_search_facility_sdsfracf.json +59 -0
  539. data/standards/stig_zos_ibm_system_display_and_search_facility_sdsftss.json +53 -0
  540. data/standards/stig_zos_icsfacf2.json +29 -0
  541. data/standards/stig_zos_icsfracf.json +35 -0
  542. data/standards/stig_zos_icsftss.json +35 -0
  543. data/standards/stig_zos_netviewacf2.json +41 -0
  544. data/standards/stig_zos_netviewracf.json +47 -0
  545. data/standards/stig_zos_netviewtss.json +53 -0
  546. data/standards/stig_zos_quest_nc-passacf2.json +35 -0
  547. data/standards/stig_zos_quest_nc-passracf.json +41 -0
  548. data/standards/stig_zos_quest_nc-passtss.json +47 -0
  549. data/standards/stig_zos_racf.json +1415 -0
  550. data/standards/stig_zos_roscoeacf2.json +47 -0
  551. data/standards/stig_zos_roscoeracf.json +53 -0
  552. data/standards/stig_zos_roscoetss.json +59 -0
  553. data/standards/stig_zos_srrauditacf2.json +23 -0
  554. data/standards/stig_zos_srrauditracf.json +23 -0
  555. data/standards/stig_zos_srraudittss.json +23 -0
  556. data/standards/stig_zos_tadzacf2.json +29 -0
  557. data/standards/stig_zos_tadzracf.json +35 -0
  558. data/standards/stig_zos_tadztss.json +35 -0
  559. data/standards/stig_zos_tdmfacf2.json +23 -0
  560. data/standards/stig_zos_tdmfracf.json +23 -0
  561. data/standards/stig_zos_tdmftss.json +23 -0
  562. data/standards/stig_zos_tss.json +1523 -0
  563. data/standards/stig_zos_vssracf.json +29 -0
  564. metadata +691 -0
@@ -0,0 +1,1961 @@
1
+ {
2
+ "name": "stig_network_security_requirements_guide",
3
+ "date": "2011-12-28",
4
+ "description": "None",
5
+ "title": "Network Security Requirements Guide",
6
+ "version": "None",
7
+ "item_syntax": "^\\w-\\d+$",
8
+ "section_separator": null,
9
+ "items": [
10
+ {
11
+ "id": "V-26709",
12
+ "title": "The network element must provide automated support for account management functions.",
13
+ "description": "Account management and distribution is vital to the security of any network element. Account management by a designated authority ensures access to network elements is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Providing automated support functions for the management of accounts will ensure only active accounts will be granted access with the proper authorization levels. As accounts are created or terminated and privilege levels are updated, the network element will automatically recognize this activity and immediately enforce the current account policy.",
14
+ "severity": "medium"
15
+ },
16
+ {
17
+ "id": "V-26710",
18
+ "title": "The network element must automatically terminate temporary accounts after an organization-defined time period for each type of account. ",
19
+ "description": "Authentication for administrative access to the device is required at all times. A single account can be created on the device's local database for use in an emergency such as when the authentication server is down or connectivity between the device and the authentication server is not operable. Temporary accounts could be used for vendor support in order to perform diagnostic. There is a risk the temporary account may remain in place and active after the vendor support team has left. The temporary account could have the highest privilege level which would enable an administrator to gain unauthorized privileges to the device.",
20
+ "severity": "medium"
21
+ },
22
+ {
23
+ "id": "V-26711",
24
+ "title": "The network element must automatically terminate emergency accounts after an organization-defined time period.",
25
+ "description": "Authentication for administrative access to the device is required at all times. A single account can be created on the device's local database for use in an emergency such as when the authentication server is down or connectivity between the device and the authentication server is not operable. The emergency account logon credentials must be stored in a sealed envelope and kept in a safe. Temporary accounts could be used for vendor support in order to perform diagnostic. There is a risk the temporary account may remain in place and active after the vendor support team has left.",
26
+ "severity": "medium"
27
+ },
28
+ {
29
+ "id": "V-26712",
30
+ "title": "The network element must automatically disable inactive accounts after an organization-defined time period of inactivity.",
31
+ "description": "There is always a risk for inactive accounts to be compromised by unauthorized users who could then gain full control of the device; thereby enabling them to trigger a Denial of Service, intercept sensitive information, or disrupt network availability.\n\nAttackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. Network elements need to track periods of user inactivity and disable application accounts after an organization-defined period of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised. \n\nTo address the multitude of policy based access requirements, many network administrators choose to integrate their network elements with enterprise level authentication/access mechanisms that meet or exceed access control policy requirements. Such integration allows the network administrator to off-load those access control functions and focus on core application features and functionality.",
32
+ "severity": "medium"
33
+ },
34
+ {
35
+ "id": "V-26713",
36
+ "title": "The network element must automatically audit the creation of accounts.",
37
+ "description": "Account management and distribution is vital to the security of any network element. Account management by a designated authority ensures access to network elements is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Without a formal approval process for the deployment and modification of accounts, personnel without the proper security clearance may gain access to critical network nodes. It is imperative that all personnel who are granted accounts have completed and submitted the proper request forms and have been approved by the designated authority. Auditing account creation and modification will provide the necessary reconciliation that account management procedures are being followed.",
38
+ "severity": "medium"
39
+ },
40
+ {
41
+ "id": "V-26714",
42
+ "title": "The network element must notify the appropriate individuals when accounts are created.",
43
+ "description": "Account management and distribution is vital to the security of any network element. Account management by a designated authority ensures access to network elements is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Without a formal approval process for the deployment and modification of accounts, personnel without the proper security clearance may gain access to critical network nodes. It is imperative that all personnel who are granted accounts have completed and submitted the proper request forms and have been approved by the designated authority. Auditing account creation and modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed.",
44
+ "severity": "medium"
45
+ },
46
+ {
47
+ "id": "V-26715",
48
+ "title": "The network element must automatically audit account modification.",
49
+ "description": "Account management and distribution is vital to the security of any network element. Account management by a designated authority ensures access to network elements is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Without a formal approval process for the deployment and modification of accounts, personnel without the proper security clearance may gain access to critical network nodes. It is imperative that all personnel who are granted accounts have completed and submitted the proper request forms and have been approved by the designated authority. Auditing account creation and modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed.",
50
+ "severity": "medium"
51
+ },
52
+ {
53
+ "id": "V-26716",
54
+ "title": "The network element must notify the appropriate individuals when accounts are modified.",
55
+ "description": "Account management and distribution is vital to the security of any network element. Account management by a designated authority ensures access to network elements is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Without a formal approval process for the deployment and modification of accounts, personnel without the proper security clearance may gain access to critical network nodes. It is imperative that all personnel who are granted accounts have completed and submitted the proper request forms and have been approved by the designated authority. Auditing account creation and modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed.",
56
+ "severity": "medium"
57
+ },
58
+ {
59
+ "id": "V-26717",
60
+ "title": "The network element must automatically audit account disabling actions.",
61
+ "description": "Account management by a designated authority ensures access to network elements is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Auditing account creation and modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed. It is also vital that the disablement of accounts is monitored to ensure that authorized active accounts remain enabled and available for use when required.",
62
+ "severity": "medium"
63
+ },
64
+ {
65
+ "id": "V-26718",
66
+ "title": "The network element must notify the appropriate individuals when account disabling actions are taken.",
67
+ "description": "Account management by a designated authority ensures access to network elements is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Auditing account creation and modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed. It is also vital that the disablement of accounts is monitored to ensure that authorized active accounts remain enabled and available for use when required. Notifying the individual whose account has been disabled will provide an alert so that the account can be enabled if it had been disabled by mistake.",
68
+ "severity": "medium"
69
+ },
70
+ {
71
+ "id": "V-26719",
72
+ "title": "The network element must automatically audit account termination.",
73
+ "description": "Account management by a designated authority ensures access to network elements is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Auditing account creation and modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed. It is also vital that the termination of accounts is monitored to ensure that authorized accounts remain active and available for use when required.",
74
+ "severity": "medium"
75
+ },
76
+ {
77
+ "id": "V-26720",
78
+ "title": "The network element must notify the appropriate individuals for account termination.",
79
+ "description": "Account management by a designated authority ensures access to network elements is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Auditing account creation and modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed. It is also vital that the termination of accounts is monitored to ensure that authorized accounts remain active and available for use when required. Notifying the individual whose account has been terminated will provide an alert so that the account can be reinstated if it had been terminated by mistake.",
80
+ "severity": "medium"
81
+ },
82
+ {
83
+ "id": "V-26721",
84
+ "title": "The network element must monitor for irregular usage of administrative user accounts.",
85
+ "description": "Atypical account usage is behavior that is not part of normal usage cycles, e.g., accounts logging in after hours or on weekends.",
86
+ "severity": "medium"
87
+ },
88
+ {
89
+ "id": "V-26722",
90
+ "title": "The network element must be configured to dynamically manage administrative privileges and associated command authorizations.",
91
+ "description": "Web services are web applications that provide a method of communication between two or more different electronic devices. They are normally used by applications to provide each other with data. \n\nThe W3C defines a web service as;\n\"a software system designed to support interoperable machine to machine interaction over a network. It has an interface described in a machine processable format (specifically Web Services Description Language or WSDL). Other systems interact with the web service in a manner prescribed by its description using SOAP messages typically conveyed using HTTP with an XML serialization in conjunction with other web-related standards\".\n\nWeb services provide different challenges in managing access than what is presented by typical user based applications. In contrast to conventional access control approaches which employ static information system accounts and predefined sets of user privileges, many service-oriented architecture implementations rely on run time access control decisions facilitated by dynamic privilege management. While user identities remain relatively constant over time, user privileges may change more frequently based on the ongoing mission/business requirements and operational needs of the organization. \n\nService Oriented Architecture (SOA) based applications need to take this possibility into account and leverage dynamic access control methodologies.",
92
+ "severity": "medium"
93
+ },
94
+ {
95
+ "id": "V-26723",
96
+ "title": "The network element must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.",
97
+ "description": "The use of Authentication, Authorization, and Accounting (AAA) affords the best methods for controlling user access, authorization levels, and activity logging. Privilege levels as well as what commands each administrator is authorized to use based on the privilege level or account group membership must be controlled and assigned accordingly. By enabling AAA on the network elements in conjunction with an authentication server, the administrators can easily add, modify, or delete accounts as well as add or remove command authorizations and privilege levels. The use of an authentication server provides the capability to assign network administrators and engineers to tiered groups that contain their associated or required privilege level. By configuring the network element to collaborate with an authentication server, it can enforce the appropriate authorization for each administrator.",
98
+ "severity": "medium"
99
+ },
100
+ {
101
+ "id": "V-26724",
102
+ "title": "The network element must enforce dual authorization based on organizational policies and procedures for organization-defined privileged commands.",
103
+ "description": "Dual authorization mechanisms require two forms of approval to execute. An organization may determine certain commands or network element configuration changes require dual-authorization before being activated. However, an organization should not employ dual authorization mechanisms when an immediate response is necessary to ensure public and environmental safety.",
104
+ "severity": "medium"
105
+ },
106
+ {
107
+ "id": "V-26725",
108
+ "title": "The network element must implement nondiscretionary access control policies over an organization-defined set of users and resources.",
109
+ "description": "Access control policies (e.g., identity-based policies, role-based policies, etc.) and access enforcement mechanisms (e.g., access control lists, policy maps, cryptography) are employed by organizations to control access between users (or processes acting on behalf of users) and objects (e.g., devices, data, destination addresses, etc.) within the network.",
110
+ "severity": "medium"
111
+ },
112
+ {
113
+ "id": "V-26726",
114
+ "title": "The information system must enforce an organization-defined Discretionary Access Control (DAC) policy allowing users to specify and control sharing by named individuals, groups of individuals, or by both, limiting propagation of access rights and including or excluding access to the granularity of a single user.",
115
+ "description": "Sharing is not applicable to network elements.",
116
+ "severity": "medium"
117
+ },
118
+ {
119
+ "id": "V-26727",
120
+ "title": "The network element must prevent access to organization-defined security-relevant information except during secure, non-operable system states.",
121
+ "description": "Security-relevant information is any information within the information system that can potentially impact the operation of security functions in a manner that could result in failure to enforce the system security policy or maintain isolation of code and data. Organizations may define specific security relevant information that requires protection. Filtering rules for routers and firewalls, cryptographic key management information, key configuration parameters for security services, and access control lists are examples of security-relevant information. \n\nSecure, nonoperable system states are states in which the network element is not performing mission or business-related processing (e.g., the system is off-line for maintenance, troubleshooting, boot-up, shutdown). Access to these types of data is to be prevented unless the system is in a maintenance mode or has otherwise been brought off-line. The goal is to minimize the potential that a security configuration or data may be dynamically and perhaps maliciously overwritten or changed without going through a formal system change process that can document the changes.",
122
+ "severity": "medium"
123
+ },
124
+ {
125
+ "id": "V-26738",
126
+ "title": "The network element must enforce approved authorizations for controlling the flow of information within the network in accordance with applicable policy.",
127
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Examples of flow control restrictions include blocking outside traffic claiming to be from within the organization, and not passing any web requests to the Internet not from the internal web proxy.",
128
+ "severity": "medium"
129
+ },
130
+ {
131
+ "id": "V-26739",
132
+ "title": "The network element must enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.",
133
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. For example, a router or firewall at the perimeter must only allow web traffic outbound received from a web proxy and directing all returning web traffic to the web proxy.",
134
+ "severity": "medium"
135
+ },
136
+ {
137
+ "id": "V-26740",
138
+ "title": "The network element must enforce information flow control using explicit security attributes on information, source, and destination objects as a basis for flow control decisions.",
139
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Restrictions can be enforced based on source and destination IP addresses as well as the ports and services being requested. This requirement should enforce the deny-by-default policy whereby only the known and accepted traffic will be allowed outbound and inbound.",
140
+ "severity": "medium"
141
+ },
142
+ {
143
+ "id": "V-26741",
144
+ "title": "The network element must enforce the highest privilege level administrative access to enable or disable security policy filters.",
145
+ "description": "The use of Authentication, Authorization, and Accounting (AAA) affords the best methods for controlling user access, authorization levels, and activity logging. By enabling AAA on the network elements in conjunction with an authentication server, the administrators can easily add, modify, or delete accounts as well as add or remove command authorizations and privilege levels. The use of an authentication server provides the capability to assign network administrators and engineers to tiered groups containing their associated or required privilege level. The network element must be configured to restrict management access according to the privilege level the user has been granted. Authorization to add, modify, or delete security policy filters must require the highest privilege level.",
146
+ "severity": "medium"
147
+ },
148
+ {
149
+ "id": "V-26742",
150
+ "title": "The network element must provide the capability for a privileged administrator to configure the organization-defined security policy filters to support different security policies.",
151
+ "description": "The network element must be configured to restrict management access according to the privilege level the user has been granted. Authorization to add, modify, or delete security policies must require the highest privilege level which can be implemented by simply assigning privilege levels to administrators or via an Authentication, Authorization, and Accounting (AAA) solution.\n\nThe implementation of an AAA solution affords the best methods for controlling user access, authorization levels, and activity logging. By enabling AAA on the network elements in conjunction with an authentication server, the administrators can easily add, modify, or delete accounts as well as add or remove command authorizations and privilege levels. The use of an authentication server provides the capability to assign network administrators and engineers to tiered groups that contain their associated or required privilege level.",
152
+ "severity": "medium"
153
+ },
154
+ {
155
+ "id": "V-26743",
156
+ "title": "The network element must identify information flows by data type specification and usage when transferring information between different security domains.",
157
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so that it does not introduce any unacceptable risk to the network infrastructure or data. Traffic flows must be identified by types and traffic rates when information is being transferred between different security domains.",
158
+ "severity": "medium"
159
+ },
160
+ {
161
+ "id": "V-26744",
162
+ "title": "The network element must decompose information into policy-relevant subcomponents for submission to policy enforcement mechanisms when transferring information between different security domains.",
163
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Information must be decomposed into policy-relevant subcomponents so the applicable policies and filters can be applied when information is being transferred between different security domains.",
164
+ "severity": "medium"
165
+ },
166
+ {
167
+ "id": "V-26745",
168
+ "title": "The network element must implement policy filters that constrain data structure and content to organization-defined information security policy requirements when transferring information between different security domains.",
169
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. It is imperative when information is being moved from one security domain to another, policy filters must be applied to the data to enforce the organizations security policy requirements.",
170
+ "severity": "medium"
171
+ },
172
+ {
173
+ "id": "V-26746",
174
+ "title": "The network element must detect unsanctioned information when transferring information between different security domains.",
175
+ "description": " Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. It is imperative when information is being moved from one security domain to another, mechanisms are deployed to detect traffic with payloads that are not in conformance with the policy of the DoD and the organization.",
176
+ "severity": "medium"
177
+ },
178
+ {
179
+ "id": "V-26747",
180
+ "title": "The network element must prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains.",
181
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. It is imperative when information is being moved from one security domain to another, policy filters must be applied to the data to enforce the organizations security policy requirements. Actions to support this requirement include but are not limited to: checking packet payload for embedded malware, dropping packets not conforming to standards, and blocking packets using ports and protocols that are not allowed to cross these domains based on DoD and local policy.",
182
+ "severity": "medium"
183
+ },
184
+ {
185
+ "id": "V-26756",
186
+ "title": "The network element must enforce security policies regarding information on interconnected systems.",
187
+ "description": "Transferring information between interconnected information systems of differing security policies introduces the risk of the transfers violating one or more policies. It is imperative for policy guidance from information owners be implemented at the policy enforcement point between the interconnected systems.",
188
+ "severity": "medium"
189
+ },
190
+ {
191
+ "id": "V-26757",
192
+ "title": "The network element must uniquely identify source domains for information transfer.",
193
+ "description": "Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the network element distinguishes between information systems and organizations, and between specific system components or individuals involved in sending and receiving information.",
194
+ "severity": "medium"
195
+ },
196
+ {
197
+ "id": "V-26758",
198
+ "title": "The network element must uniquely authenticate source domains for information transfer.",
199
+ "description": "Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the network element authenticates the source involved in sending information.",
200
+ "severity": "medium"
201
+ },
202
+ {
203
+ "id": "V-26759",
204
+ "title": "The network element must uniquely identify and validate destination domains for information transfer.",
205
+ "description": "Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the network element distinguishes between information systems and organizations, and between specific system components or individuals involved in sending and receiving information.",
206
+ "severity": "medium"
207
+ },
208
+ {
209
+ "id": "V-26760",
210
+ "title": "The network element must uniquely authenticate destination domains for information transfer.",
211
+ "description": "Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the network element authenticates the source involved in receiving information.",
212
+ "severity": "medium"
213
+ },
214
+ {
215
+ "id": "V-26761",
216
+ "title": "The information system must bind security attributes to information to facilitate information flow policy enforcement.",
217
+ "description": "Network elements do not transfer data (other than its configuration or image file to and from an FTP or TFTP server) - they merely forward received traffic to the next-hop towards its destination. There are no information owners.",
218
+ "severity": "medium"
219
+ },
220
+ {
221
+ "id": "V-26762",
222
+ "title": "The information system must track problems associated with the security attribute binding.",
223
+ "description": "Network elements do not transfer data (other than its configuration or image file to and from an FTP or TFTP server) - they merely forward received traffic to the next-hop towards its destination. There are no information owners.",
224
+ "severity": "medium"
225
+ },
226
+ {
227
+ "id": "V-26763",
228
+ "title": "The network element must implement security policies for all traffic flows by using security zones at various protection levels as a basis for flow control decisions.",
229
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Restrictions can be enforced using security zones at various protection levels as a basis for flow control decisions.",
230
+ "severity": "medium"
231
+ },
232
+ {
233
+ "id": "V-26764",
234
+ "title": "The network must enforce dynamic traffic flow control based on policy allowing or disallowing flows based upon traffic types and rates within or out of profile.",
235
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Restrictions can be enforced based on policy allowing or disallowing flows based upon traffic types and rates within or out of profile.",
236
+ "severity": "medium"
237
+ },
238
+ {
239
+ "id": "V-26765",
240
+ "title": "All encrypted traffic must be decrypted prior to passing through content inspection and filtering mechanisms.",
241
+ "description": "Allowing traffic to bypass the security checkpoints such as firewalls and intrusion detection systems puts the network infrastructure and critical data at risk. Malicious traffic could enter the network undetected and attack a key network element or the server farm. Hence, it is imperative all encrypted traffic entering the network is decrypted prior to the content checking devices.",
242
+ "severity": "medium"
243
+ },
244
+ {
245
+ "id": "V-26766",
246
+ "title": "The network element must terminate all tunnels prior to passing through the perimeter security zone.",
247
+ "description": "Allowing traffic to bypass the security checkpoints such as firewalls and intrusion detection systems puts the network infrastructure and critical data at risk. Malicious traffic could enter the network undetected and attack a key network element or the server farm. Hence, it is imperative all tunneled traffic entering the network terminate prior to the content checking devices.",
248
+ "severity": "medium"
249
+ },
250
+ {
251
+ "id": "V-26781",
252
+ "title": "The network element must enforce information flow control on metadata.",
253
+ "description": "Metadata is defined as data providing information about one or more other pieces of data such as purpose of the data, author or creator of the data, and network location of where data was created, and network specific information.\n\nInformation flow control regulates where information is allowed to travel within a network and between hosts as opposed to who is allowed to access the information. Information flow enforcement mechanisms compare security attributes on all information such as source and destination objects, and respond appropriately (e.g., block, quarantine, alert administrator) when the mechanisms encounter information flows not explicitly allowed by the information flow policy.",
254
+ "severity": "medium"
255
+ },
256
+ {
257
+ "id": "V-26783",
258
+ "title": "The network element must enforce organization-defined one-way traffic flows using hardware mechanisms.",
259
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data.",
260
+ "severity": "medium"
261
+ },
262
+ {
263
+ "id": "V-26784",
264
+ "title": "The network element must enforce information flow control using organization-defined security policy filters as a basis for flow control decisions.",
265
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Restrictions can be enforced based on source and destination IP addresses as well as the ports and services being requested using security policy filters.",
266
+ "severity": "medium"
267
+ },
268
+ {
269
+ "id": "V-26793",
270
+ "title": " The information system must track problems associated with the information transfer.",
271
+ "description": "Network elements do not bind security attributes with packets it is forwarding. It may use Quality of Service (QoS) along with L2 and L3 headers, but not security attributes.",
272
+ "severity": "medium"
273
+ },
274
+ {
275
+ "id": "V-26794",
276
+ "title": "The network element must implement separation of duties through assigned information system access authorizations.",
277
+ "description": "The use of Authentication, Authorization, and Accounting (AAA) affords the best methods for controlling user access, authorization levels, and activity logging. By enabling AAA on the network elements in conjunction with an authentication server, the administrators can easily add, modify, or delete accounts, as well as, add or remove command authorizations and privilege levels. The use of an authentication server provides the capability to assign network administrators and engineers to tiered groups containing their associated or required privilege levels establishing what commands and objects the authenticated administrator is authorized to access. This implementation would enforce the organization’s AAA policy for separation of duties and its responsibility assignments for each administrator.",
278
+ "severity": "medium"
279
+ },
280
+ {
281
+ "id": "V-26795",
282
+ "title": "The network element must audit the use of privileged accounts when accessing configuration and operational commands enabled for non-privileged accounts.",
283
+ "description": "Each account should grant access to only those privileges the system administrator is authorized for. By not restricting system administrators to their proper privilege levels, access to restricted and advanced functions may be provided to system administrators not authorized or trained to use those functions. Network disruptions or outages could be caused by mistakes made by inexperienced system administrators. Monitoring account usage will reduce the risk of a privilege account being exploited by unauthorized persons and provides logging to be used for forensic investigation.",
284
+ "severity": "medium"
285
+ },
286
+ {
287
+ "id": "V-26796",
288
+ "title": "The network element must provide the capability for a privileged administrator to configure organization-defined security policy filters to support different security policies.",
289
+ "description": "Each account should grant access to only those privileges the system administrator is authorized for. By not restricting system administrators to their proper privilege levels, access to restricted and advanced functions may be provided to system administrators not authorized or trained to use those functions. Network disruptions or outages could be caused by mistakes made by inexperienced system administrators. Monitoring account usage will reduce the risk of a privilege account being exploited by unauthorized persons and provides logging to be used for forensic investigation. Only accounts with the highest privilege level should have the authorization to configure security policy filters.",
290
+ "severity": "medium"
291
+ },
292
+ {
293
+ "id": "V-26797",
294
+ "title": "The information system must provide additional protection for mobile devices accessed via login by purging information from the device after organization-defined number of consecutive, unsuccessful login attempts to the mobile device.",
295
+ "description": "This requirement applies only to mobile devices for which a login occurs (e.g., personal digital assistants and smart phones) and not to mobile devices accessed without a login such as removable media. In certain situations, this requirement may not apply to mobile devices if the information on the device is encrypted with sufficiently strong encryption mechanisms, making purging unnecessary. The login is to the mobile device, not to any one account on the device. \n\n",
296
+ "severity": "medium"
297
+ },
298
+ {
299
+ "id": "V-26798",
300
+ "title": "The network element must enforce the organization-defined limit of consecutive invalid access attempts by a user during the organization-defined time period.",
301
+ "description": "A malicious or unauthorized user could gain access to a network element by guessing or using methods such as dictionary attack, word list substitution, or brute force attack—all of which require multiple attempts. By limiting the number of failed login attempts within a defined period of time, the risk of unauthorized system access via user password guessing can be mitigated.",
302
+ "severity": "medium"
303
+ },
304
+ {
305
+ "id": "V-26799",
306
+ "title": "The network element must enforce the organization-defined time period during which the limit of consecutive invalid access attempts by a user is counted.",
307
+ "description": "A malicious or unauthorized user could gain access to a network element by guessing or using methods such as dictionary attack, word list substitution, or brute force attack—all of which require multiple attempts. By limiting the number of failed login attempts within a defined period of time, the risk of unauthorized system access via user password guessing can be mitigated.",
308
+ "severity": "medium"
309
+ },
310
+ {
311
+ "id": "V-26800",
312
+ "title": "The network element must automatically lock out an account after the maximum number of unsuccessful attempts is exceeded and remain locked until released by an administrator.",
313
+ "description": "A malicious or unauthorized user could gain access to a network element by guessing or using methods such as dictionary attack, word list substitution, or brute force attack—all of which require multiple attempts. Locking out an account after a maximum number of unsuccessful attempts are exceeded will reduce the risk of unauthorized system access via password guessing.",
314
+ "severity": "medium"
315
+ },
316
+ {
317
+ "id": "V-26801",
318
+ "title": "The network element must display an approved system use notification message or banner before granting access to the system.",
319
+ "description": "All network devices must present a DoD approved warning banner prior to a system administrator logging on. The banner should warn any unauthorized user not to proceed. It also should provide clear and unequivocal notice to both authorized and unauthorized personnel that access to the device is subject to monitoring to detect unauthorized usage. Failure to display the required login warning banner prior to logon attempts will limit the ability to prosecute unauthorized access and also presents the potential to give rise to criminal and civil liability for systems administrators and information systems managers. In addition, DISA’s ability to monitor the device’s usage is limited unless a proper warning banner is displayed.",
320
+ "severity": "medium"
321
+ },
322
+ {
323
+ "id": "V-26802",
324
+ "title": "The network element must display an approved banner to the administrator and is retained on the screen until the administrator takes explicit actions to log on.",
325
+ "description": "All network devices must present a DoD approved warning banner prior to a system administrator logging on. The banner should warn any unauthorized user not to proceed. It also should provide clear and unequivocal notice to both authorized and unauthorized personnel that access to the device is subject to monitoring to detect unauthorized usage. Failure to display the required login warning banner prior to logon attempts will limit DISA’s ability to prosecute unauthorized access and also presents the potential to give rise to criminal and civil liability for systems administrators and information systems managers. In addition, DISA’s ability to monitor the device’s usage is limited unless a proper warning banner is displayed.",
326
+ "severity": "medium"
327
+ },
328
+ {
329
+ "id": "V-26803",
330
+ "title": "The network element must display must display an approved system use notification message or banner before granting access to the device.",
331
+ "description": "All network devices must present a DoD approved warning banner before granting access to the device. The banner shall be formatted in accordance with the DoD policy \"Use of DoD Information Systems - Standard Consent and User Agreement\". The message banner shall provide privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and shall state that:\n \n(i) users are accessing a U.S. Government information system; \n(ii) system usage may be monitored, recorded, and is subject to audit; \n(iii) unauthorized use of the system is prohibited and subject to criminal and civil penalties;\n(iv) use of the system indicates consent to monitoring and recording;\n(v) in the notice given to public users of the information system, shall provide a description of the authorized uses of the system.\n\nSystem use notification messages are implemented in the form of warning banners displayed when individuals log in to the information system. System use notification is intended only for information system access that includes an interactive login interface with a human user and is not intended to require notification when an interactive interface does not exist. \n\nThe banner shall state:\n\nYou are accessing a U.S. Government (USG) Information System (IS) that is provided\nfor USG-authorized use only.\nBy using this IS (which includes any device attached to this IS), you consent to the\nfollowing conditions:\n-The USG routinely intercepts and monitors communications on this IS for purposes\nincluding, but not limited to, penetration testing, COMSEC monitoring, network\noperations and defense, personnel misconduct (PM), law enforcement (LE), and\ncounterintelligence (CI) investigations.\n-At any time, the USG may inspect and seize data stored on this IS.\n-Communications using, or data stored on, this IS are not private, are subject to routine\nmonitoring, interception, and search, and may be disclosed or used for any USG authorized\npurpose.\n-This IS includes security measures (e.g., authentication and access controls) to protect\nUSG interests--not for your personal benefit or privacy.\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI\ninvestigative searching or monitoring of the content of privileged communications, or\nwork product, related to personal representation or services by attorneys,\npsychotherapists, or clergy, and their assistants. Such communications and work product\nare private and confidential. See User Agreement for details.",
332
+ "severity": "medium"
333
+ },
334
+ {
335
+ "id": "V-26808",
336
+ "title": "Upon successful logon the network element must display the date and time of the last logon of the user.",
337
+ "description": "Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.",
338
+ "severity": "medium"
339
+ },
340
+ {
341
+ "id": "V-26809",
342
+ "title": "Upon successful logon the network element must display to the user the number of unsuccessful logon attempts since the last successful logon.",
343
+ "description": "Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.",
344
+ "severity": "medium"
345
+ },
346
+ {
347
+ "id": "V-26812",
348
+ "title": "The network element must notify the user of the number of successful login attempts to the local device occurring during an organization-defined time period.",
349
+ "description": "Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.",
350
+ "severity": "medium"
351
+ },
352
+ {
353
+ "id": "V-26813",
354
+ "title": "The network element must notify the user of the number of unsuccessful login attempts to the local device occurring during organization-defined time period.",
355
+ "description": "Providing users with information regarding the date and time of their last unsuccessful login to the device allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.",
356
+ "severity": "medium"
357
+ },
358
+ {
359
+ "id": "V-26814",
360
+ "title": "The network element must notify the user of organization-defined security-related changes to the user’s account occurring during the organization-defined time period.",
361
+ "description": "Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators. Changes to the user account during a specific time period could be an indication of the account being compromised. Hence, without notification to the user, the compromise could go undetected.",
362
+ "severity": "medium"
363
+ },
364
+ {
365
+ "id": "V-26815",
366
+ "title": "The network element must limit the number of concurrent sessions for each account to an organization-defined number.",
367
+ "description": "This requirement addresses concurrent sessions for a given information system account and does not address concurrent sessions by a single user via multiple accounts. Limiting the number of concurrent sessions to the device per any given account mitigates the risk associated with a Denial of Service (DoS) attack.",
368
+ "severity": "medium"
369
+ },
370
+ {
371
+ "id": "V-26816",
372
+ "title": "The information system session lock mechanism, when activated on a device with a display screen, must place a publicly viewable pattern onto the associated display, hiding what was previously visible on the screen.",
373
+ "description": "As configuration changes are made to a router, switch, or firewall, they are applied to the running configuration. There is nothing lost. If the user has not saved the running configuration to non-volatile random-access memory (NVRAM), it can be done by logging back in. Furthermore, a desktop or laptop is used to connect to the router, switch, or firewall. The routers, switches, and firewalls have the idle timeout capability where the session is taken down after a period of inactivity. This is a simple and straightforward solution.",
374
+ "severity": "medium"
375
+ },
376
+ {
377
+ "id": "V-26817",
378
+ "title": "The information system must initiate a session lock after the organization-defined time period of inactivity.",
379
+ "description": "As configuration changes are made to a router, switch, or firewall, they are applied to the running configuration. There is nothing lost. If the user has not saved the running configuration to non-volatile random-access memory (NVRAM), it can be done by logging back in. Furthermore, a desktop or laptop is used to connect to the router, switch, or firewall. The routers, switches, and firewalls have the idle timeout capability where the session is taken down after a period of inactivity. This is a simple and straightforward solution.",
380
+ "severity": "medium"
381
+ },
382
+ {
383
+ "id": "V-26818",
384
+ "title": "The information system must retain the session lock until the user reestablishes access using established identification and authentication procedures.",
385
+ "description": "With a router or firewall—at least Cisco, as any configuration changes are made, they are applied to the running configuration. There is nothing lost. If the user has not saved the running configuration to non-volatile random-access memory (NVRAM), it can be done by logging back in. Furthermore, a desktop or laptop is used to connect to the router, switch, or firewall. The routers, switches, and firewalls have the idle timeout capability where the session is taken down after a period of inactivity. This is a simple and straightforward solution.",
386
+ "severity": "medium"
387
+ },
388
+ {
389
+ "id": "V-26824",
390
+ "title": "The network element must support and maintain the binding of organization-defined security attributes to information in storage.",
391
+ "description": "Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are typically associated with internal data structures (e.g., records, buffers, files) within the network element and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. The term security label is often used to associate a set of security attributes with a specific information object as part of the data structure for that object (e.g., user access privileges, nationality, affiliation as contractor). These attributes may be assigned during data processing. However these assignments must also be maintained while the data is in storage such as the device’s on-volatile random-access memory (NVRAM) or flash. ",
392
+ "severity": "medium"
393
+ },
394
+ {
395
+ "id": "V-26826",
396
+ "title": "The network element must support and maintain the binding of organization-defined security attributes to information in process.",
397
+ "description": "The binding of these attribute assignments to information must be maintained while the data is in process such as switching, traffic classification, QoS marking, packet filtering, address translation, etc. ",
398
+ "severity": "medium"
399
+ },
400
+ {
401
+ "id": "V-26854",
402
+ "title": "The network element must support and maintain the binding of organization-defined security attributes to information in transmission.",
403
+ "description": "Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are typically associated with internal data structures (e.g., records, buffers, files) within the network element and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. The term security label is often used to associate a set of security attributes with a specific information object as part of the data structure for that object (e.g., user access privileges, nationality, affiliation as contractor). These attributes may be assigned during data processing however these assignments also need to be maintained while the data is in storage. Organizations define the security attributes (e.g., classified, FOUO) of their data. The binding of these attribute assignments to information must be maintained while the data is being transmitted natively or encapsulated into layer 2 or layer 3 tunnels.",
404
+ "severity": "medium"
405
+ },
406
+ {
407
+ "id": "V-26877",
408
+ "title": "The network element must dynamically reconfigure security attributes in accordance with an identified security policy as information is created and combined.",
409
+ "description": "Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are typically associated with internal data structures (e.g., data records, buffers, files) within the network element and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. The term security label is often used to associate a set of security attributes with a specific information object as part of the data structure for that object (e.g., user access privileges, nationality, affiliation as contractor). A security label is defined as: the means used to associate a set of security attributes with a specific information object as part of the data structure for that object. Examples of a security label of a packet could be traffic flow (source, destination, protocol combination), traffic classification based on QoS markings for preferred treatment, VLAN identification, etc.",
410
+ "severity": "medium"
411
+ },
412
+ {
413
+ "id": "V-26885",
414
+ "title": "The network element must only allow authorized entities to change security attributes.",
415
+ "description": "Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are typically associated with internal data structures (e.g., records, buffers, files) within the network element and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. The term security label is often used to associate a set of security attributes with a specific information object as part of the data structure for that object (e.g., user access privileges, nationality, affiliation as contractor). Examples of a security label of a packet could be traffic flow (source, destination, protocol combination), traffic classification based on QoS markings for preferred treatment, VLAN identification, etc. Examples of entities that can make these changes are configured policies on routers and multilayer switches, access switchport that are configured to mark the class of service or a set a VLAN identification of an ingress packet, and the administrators that are authorized to make and implement these configurations.",
416
+ "severity": "medium"
417
+ },
418
+ {
419
+ "id": "V-26898",
420
+ "title": "The network element must maintain the binding of security attributes to information with sufficient assurance that the information-attribute association can be used as the basis for automated policy actions.",
421
+ "description": "Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are typically associated with internal data structures (e.g., records, buffers, files) within the network element and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. Network elements that maintain the binding of organization defined security attributes to data must ensure that the information-attribute associations can be used as a basis for automated policy actions.\n\nExamples of automated policy actions include automated access control decisions (e.g., Mandatory Access Control decisions), or decisions to release (or not release) information (e.g., information flows via cross domain systems).\n\n",
422
+ "severity": "medium"
423
+ },
424
+ {
425
+ "id": "V-26899",
426
+ "title": "The network element must allow authorized users to associate security attributes with information.",
427
+ "description": "Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are typically associated with internal data structures (e.g., records, buffers, files) within the network element and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. \n\nThe term security label is often used to associate a set of security attributes with a specific information object as part of the data structure for that object (e.g., user access privileges, nationality, affiliation as contractor). A security label is defined as the means used to associate a set of security attributes with a specific information object as part of the data structure for that object.\n\nThroughout the course of normal usage, authorized users of operating systems that handle sensitive data will have the need to associate security attributes with information. Operating systems that maintain the binding of organization defined security attributes to data must ensure that authorized users can associate security attributes with information.",
428
+ "severity": "medium"
429
+ },
430
+ {
431
+ "id": "V-26982",
432
+ "title": "The network element must display security attributes in human-readable form on each object output from the system to system output devices to identify an organization-identified set of special dissemination, handling, or distribution instructions using organization-identified human readable, standard naming conventions.",
433
+ "description": "Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are typically associated with internal data structures (e.g., records, buffers, files, registry keys) within the information system and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. Examples of application security attributes are classified, FOUO, sensitive, etc. \n\nThe term security label is often used to associate a set of security attributes with a specific information object as part of the data structure for that object (e.g., user access privileges, nationality, affiliation as contractor). A security label is defined as: the means used to associate a set of security attributes with a specific information object as part of the data structure for that object.\n\nSecurity attributes need to be displayed in human readable form in order to determine how the data should be disseminated, handled and what distribution instructions apply to the data. When applications generate or output data, the associated security attributes need to be displayed.\nObjects output from the information system include, for example, pages, screens, or equivalent. Output devices include, for example, printers and video displays on computer terminals, monitors, screens on notebook/laptop computers and personal digital assistants.",
434
+ "severity": "medium"
435
+ },
436
+ {
437
+ "id": "V-26983",
438
+ "title": "The network element must employ automated mechanisms to facilitate the monitoring and control of remote access methods.",
439
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Monitoring of remote access sessions allows organizations to audit user activities and to ensure compliance with the remote access policy. Unless restrictions are put in place, a user connecting to the LAN via remote access can access/perform everything he/she could access/perform as those connected internally. Monitoring will ensure unauthorized access to the enclave’s resources and data will not go undetected.",
440
+ "severity": "medium"
441
+ },
442
+ {
443
+ "id": "V-26984",
444
+ "title": "The network element must use approved cryptography to protect the confidentiality of remote access sessions.",
445
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Remote access sessions must use encryption to protect the confidentiality of information traveling through a public network such as the Internet. Requiring remote access sessions to the enclave to traverse an encrypted tunnel, authorized on a per client basis, makes the session difficult to snoop or spoof.",
446
+ "severity": "medium"
447
+ },
448
+ {
449
+ "id": "V-26985",
450
+ "title": "The network element must be configured to use cryptography to protect the integrity of remote access sessions.",
451
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Remote access sessions must use encryption to protect the integrity of information traveling through a public network such as the Internet. Requiring remote access sessions to the enclave to traverse an encrypted tunnel makes the session difficult to alter the content.",
452
+ "severity": "medium"
453
+ },
454
+ {
455
+ "id": "V-26986",
456
+ "title": "The network element must route all remote access traffic through managed access control points.",
457
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Regardless of the backbone networks used for transit between the user end-point and the remote access server (VPN appliance, firewall, ISDN), remote connections must be secured and must not be given direct access to the private network. Traffic between the remote access server and the private network must be secured. Therefore, the remote access server must forward traffic destined to the private network to the firewall interface inspecting all private network ingress traffic.",
458
+ "severity": "medium"
459
+ },
460
+ {
461
+ "id": "V-26987",
462
+ "title": "The network element must monitor for unauthorized remote connections to specific information systems on an organization-defined frequency.",
463
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Monitoring of remote access sessions allows organizations to audit user activities and to ensure compliance with the remote access policy. Unless restrictions are put in place, a user connecting to the LAN via remote access can access/perform everything he/she could access/perform as those connected internally. Monitoring will ensure unauthorized access to the enclave’s resources and data will not go undetected.",
464
+ "severity": "medium"
465
+ },
466
+ {
467
+ "id": "V-26988",
468
+ "title": "The network element must audit remote sessions for accessing an organization-defined list of security functions and security-relevant information.",
469
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Monitoring of remote access sessions allows organizations to audit user activities and to ensure compliance with the remote access policy. Unless restrictions are put in place, a user connecting to the LAN via remote access can access/perform everything he/she could access/perform as those connected internally. Monitoring will ensure unauthorized access to the enclave’s resources and data will not go undetected.",
470
+ "severity": "medium"
471
+ },
472
+ {
473
+ "id": "V-26989",
474
+ "title": "The network element must disable use of organization-defined networking protocols within the device configuration deemed to be nonsecure except for explicitly identified components in support of specific operational requirements.",
475
+ "description": "Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadband, and wireless. \n\nSome networking protocols that allow remote access may not meet security requirements to protect data and components. The organization can either make a determination as to the relative security of the networking protocol or base the security decision on the assessment of other entities.",
476
+ "severity": "medium"
477
+ },
478
+ {
479
+ "id": "V-26990",
480
+ "title": "The network element must enforce requirements for remote connections to the network.",
481
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Enabling access to the network from outside introduces security risks which must be addressed through implementation of strict controls and procedures such as authentication and defining what resources can be accessed.",
482
+ "severity": "medium"
483
+ },
484
+ {
485
+ "id": "V-26991",
486
+ "title": "The network element must protect wireless access to the network using authentication.",
487
+ "description": "The security boundary of a Wireless LAN (WLAN) extends from the client device to the network boundary where network access is controlled. This boundary represents the portion of the network most vulnerable to attack and must be protected. Within this boundary there must be two distinct, but related, security protection mechanisms: authentication and data-in-transit encryption. These protections ensure access control and protection from eavesdropping for both the WLAN system and the DoD network enclave.",
488
+ "severity": "medium"
489
+ },
490
+ {
491
+ "id": "V-26992",
492
+ "title": "The network element must protect wireless access to the network using encryption.",
493
+ "description": "The security boundary of a Wireless LAN (WLAN) extends from the client device to the network boundary where network access is controlled. This boundary represents the portion of the network most vulnerable to attack and must be protected. Within this boundary there must be two distinct, but related, security protection mechanisms: authentication and data-in-transit encryption. These protections ensure access control and protection from eavesdropping for both the WLAN system and the DoD network enclave.",
494
+ "severity": "medium"
495
+ },
496
+ {
497
+ "id": "V-26993",
498
+ "title": "The network element must monitor for unauthorized connections of mobile devices to information systems.",
499
+ "description": "Wireless services enable users within close proximity of access points to have access to data and services within the private network. The security boundary of a Wireless LAN extends from the client device to the network boundary where network access is controlled. This boundary represents the portion of the network most vulnerable to attack and thereby must be protected. Unless restrictions are put in place, a user connecting to the enclave via wireless access can access/perform everything he/she could access/perform as those connected via Ethernet. Monitoring will ensure unauthorized access to the enclave’s resources and data will not go undetected.\n\n\nUse of unapproved devices to process non-publicly releasable data increases the risk to the network. Devices attached to or inserted into the end point's plug-and-play ports and slots can be a vector for the insertion of malware when used to access the network. Storage devices are portable and can be easily concealed. Requiring approval prior to use these devices heightens awareness of the threat, limits the potential use of contaminated devices, and allows for proper tracking and control. Designated Approval Authority (DAA) approval of flash memory devices is required by the United States Cyber Command (USCYBERCOM) Communications Task Order (CTO) 10-004A Removable Flash Media Device Implementation within and between Department of Defense (DoD) Networks (U/FOUO) (or latest version of this CTO).",
500
+ "severity": "medium"
501
+ },
502
+ {
503
+ "id": "V-26994",
504
+ "title": "The network element must enforce requirements for the connection of mobile devices to organizational information systems.",
505
+ "description": "Wireless services enable users within close proximity of access points to have access to data and services within the private network. The security boundary of a Wireless LAN extends from the client device to the network boundary where network access is controlled. This boundary represents the portion of the network most vulnerable to attack and must be protected. Wireless access introduces security risks which must be addressed through implementation of strict controls and procedures such as, authentication, encryption, and defining what resources can be accessed.\n\nUse of unapproved devices to process non-publicly releasable data increases the risk to the network. Devices attached to or inserted into the end point's plug-and-play ports and slots can be a vector for the insertion of malware when used to access the network. Storage devices are portable and can be easily concealed. Requiring approval prior to use these devices heightens awareness of the threat, limits the potential use of contaminated devices, and allows for proper tracking and control. Designated Approval Authority (DAA) approval of flash memory devices is required by the United States Cyber Command (USCYBERCOM) Communications Task Order (CTO) 10-004A Removable Flash Media Device Implementation within and between Department of Defense (DoD) Networks (U/FOUO) (or latest version of this CTO).\n",
506
+ "severity": "medium"
507
+ },
508
+ {
509
+ "id": "V-26995",
510
+ "title": "The network element must be configured to disable functionality that provides the capability for automatic execution of code on mobile devices without user direction.",
511
+ "description": "Auto execution vulnerabilities can result in malicious programs being executed that can be used to cause a denial of service on the device and hence disrupt network services. Examples of information system functionality that provide the capability for automatic execution of code are AutoRun and AutoPlay.",
512
+ "severity": "medium"
513
+ },
514
+ {
515
+ "id": "V-26996",
516
+ "title": "The information system must employ automated mechanisms to enable authorized users to make information sharing decisions based on access authorizations of sharing partners and access restrictions on information to be shared.",
517
+ "description": "Network elements do not share information with partners.",
518
+ "severity": "medium"
519
+ },
520
+ {
521
+ "id": "V-26997",
522
+ "title": "The network element must produce log records that contain sufficient information to establish what type of events occurred.",
523
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element.",
524
+ "severity": "medium"
525
+ },
526
+ {
527
+ "id": "V-26998",
528
+ "title": "The network element must produce log records containing sufficient information to establish when the events occurred.",
529
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to establish and correlate the series of events leading up to an outage or attack, it is imperative the date and time are recorded in all log records.",
530
+ "severity": "medium"
531
+ },
532
+ {
533
+ "id": "V-26999",
534
+ "title": "The network element must produce log records containing sufficient information to establish where the events occurred.",
535
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to establish and correlate the series of events leading up to an outage or attack, it is imperative the source or object of the log record is recorded in all log records.",
536
+ "severity": "medium"
537
+ },
538
+ {
539
+ "id": "V-27000",
540
+ "title": "The network element must produce log records containing sufficient information to determine if the event was a success or failure.",
541
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. Denied traffic must be logged. There may also be some instances were a packet that was permitted or other successful event (i.e., logon) should be logged to establish and correlate the series of events leading up to an outage or attack.",
542
+ "severity": "medium"
543
+ },
544
+ {
545
+ "id": "V-27001",
546
+ "title": "The network element must produce audit records that contain sufficient information to establish the identity of any user or subject associated with the event.",
547
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to establish and correlate the series of events leading up to an outage or attack, it is imperative the originator of the log record is recorded in all log records.",
548
+ "severity": "medium"
549
+ },
550
+ {
551
+ "id": "V-27002",
552
+ "title": "The network element must produce log records containing sufficient information to establish the sources of the events.",
553
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, when and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to establish and correlate the series of events leading up to an outage or attack, it is imperative the originator of the log record is recorded in all log records.",
554
+ "severity": "medium"
555
+ },
556
+ {
557
+ "id": "V-27003",
558
+ "title": "The network element must produce log records that contain detailed information for events identified by type, location, and subject.",
559
+ "description": "Information system auditing capability is critical for accurate forensic analysis. Audit record content that may be necessary to satisfy the requirement of this control, includes, for example, time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked.",
560
+ "severity": "medium"
561
+ },
562
+ {
563
+ "id": "V-27004",
564
+ "title": "The network element must support the requirement to centrally manage the content of audit records generated by network infrastructure components.",
565
+ "description": "Centrally managing audit data provides for easier management of network events and is an effective facility for monitoring and the automatic generation of alert notification. The repository of audit data can facilitate troubleshooting when problems are encountered and can assist in performing root cause analysis. A repository of audit data can also be correlated in real time to identify suspicious behavior or be archived for review at a later time for research and analysis.",
566
+ "severity": "medium"
567
+ },
568
+ {
569
+ "id": "V-27005",
570
+ "title": "The network element must be configured to allocate audit record storage capacity.",
571
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the network element is configured to allocate storage capacity to contain log records.",
572
+ "severity": "medium"
573
+ },
574
+ {
575
+ "id": "V-27006",
576
+ "title": "The network element logging facility must be configured to reduce the likelihood of log record capacity being exceeded.",
577
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the network element is configured to allocate enough log record storage capacity that will not become exhausted.",
578
+ "severity": "medium"
579
+ },
580
+ {
581
+ "id": "V-27007",
582
+ "title": "The network element must provide a warning when the logging storage capacity reaches an organization-defined percentage of maximum capacity.",
583
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the network element is configured to allocate storage capacity to contain log records and an alert is generated when the capacity reaches an organization-defined threshold.",
584
+ "severity": "medium"
585
+ },
586
+ {
587
+ "id": "V-27008",
588
+ "title": "The network element must provide a real-time alert when organization-defined audit failure events occur.",
589
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the network element is configured to generate an alarm when an audit failure occurs.",
590
+ "severity": "medium"
591
+ },
592
+ {
593
+ "id": "V-27009",
594
+ "title": "The network element must enforce configurable traffic volume thresholds representing logging capacity for network traffic to be logged. ",
595
+ "description": "Different applications have unique requirements and toleration levels for delay, jitter, bandwidth, packet loss, and availability. To manage the multitude of applications and services, a network requires a Quality of Service (QoS) framework to differentiate traffic and provide a method to avoid and manage network congestion. When network congestion occurs, all traffic has an equal chance of being dropped. QoS categorizes network traffic, prioritizes it according to its relative importance, and provides priority treatment based on the classification. Many DoS attacks target the network core by attempting to saturate link capacity and exhausting router processors. If hackers can compromise QoS trust boundaries, they can amplify the effect of their abuse. When attack traffic receives premium services, it not only forces priority traffic such as voice to compete for service, it robs critical control-plane and network management traffic the service it demands to ensure routing convergence and network availability. Furthermore, it enables the attacker to easily induce a sustained DoS attack on all network resources along the entire path where QoS has been hijacked. It is imperative that traffic marked for premium service is strictly policed. Traffic that is out of profile must be marked down by placing it into a low priority class.",
596
+ "severity": "medium"
597
+ },
598
+ {
599
+ "id": "V-27010",
600
+ "title": "The network element must reject or delay network traffic generated above configurable traffic volume thresholds as defined by the organization.",
601
+ "description": "Different applications have unique requirements and toleration levels for delay, jitter, bandwidth, packet loss, and availability. To manage the multitude of applications and services, a network requires a Quality of Service (QoS) framework to differentiate traffic and provide a method to avoid and manage network congestion. When network congestion occurs, all traffic has an equal chance of being dropped. QoS categorizes network traffic, prioritizes it according to its relative importance, and provides priority treatment based on the classification. Many DoS attacks target the network core by attempting to saturate link capacity and exhausting router processors. If hackers can compromise QoS trust boundaries, they can amplify the effect of their abuse. When attack traffic receives premium services, it not only forces priority traffic such as voice to compete for service, it robs critical control-plane and network management traffic the service it demands to ensure routing convergence and network availability. Furthermore, it enables the attacker to easily induce a sustained DoS attack on all network resources along the entire path where QoS has been hijacked. It is imperative that traffic marked for premium service is strictly policed. Traffic that is out of profile must be marked down by placing it into a low priority class.",
602
+ "severity": "medium"
603
+ },
604
+ {
605
+ "id": "V-27074",
606
+ "title": "The network element must invoke a system shutdown in the event of an audit failure, unless an alternative audit capability exists.",
607
+ "description": "It is critical that when a network device is at risk of failing to process audit logs as required, it takes action to mitigate the failure. If the device were to continue processing without auditing enabled, a network device or the network itself could be compromised without any information that can be used for the trace back of an attack and for forensic analysis.",
608
+ "severity": "medium"
609
+ },
610
+ {
611
+ "id": "V-27083",
612
+ "title": "The network element must be configured to send an alert to designated personnel in the event of an audit processing failure.",
613
+ "description": "Auditing and logging are key components of any security architecture. It is essential that security personnel know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify a network element that has been configured improperly. It is imperative that the network element is configured to generate an alarm when an audit failure occurs.",
614
+ "severity": "medium"
615
+ },
616
+ {
617
+ "id": "V-27091",
618
+ "title": "The network element must be configured to stop generating log records or overwrite the oldest log records when an audit failure occurs.",
619
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. To preserve recent audit information, if an audit failure occurs, the network element must either stop producing audit records to overwrite or purge the oldest records.",
620
+ "severity": "medium"
621
+ },
622
+ {
623
+ "id": "V-27098",
624
+ "title": "The network element must integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities.",
625
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple network elements to acquire a clear understanding as to what happened or is happening. Collecting log data and presenting that data in a single, consolidated view achieves this objective.",
626
+ "severity": "medium"
627
+ },
628
+ {
629
+ "id": "V-27108",
630
+ "title": " The network element must centralize the review and analysis of audit records from multiple network elements within the network.",
631
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple network elements to acquire a clear understanding as to what happened or is happening. Collecting log data and presenting the data in a single, consolidated view achieves this objective.",
632
+ "severity": "medium"
633
+ },
634
+ {
635
+ "id": "V-27112",
636
+ "title": "The network element must employ automated mechanisms to alert security personnel of any inappropriate or unusual activities with security implications.",
637
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. By immediately displaying an alarm message, identifying the potential security violation and making it accessible with the audit record contents associated with the event(s) that generated the alarm provides the staff prompt alert messages 24 x 7 regardless of if they are logged on.",
638
+ "severity": "medium"
639
+ },
640
+ {
641
+ "id": "V-27123",
642
+ "title": "The network element must provide an audit reduction capability.",
643
+ "description": "to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple network elements acquiring a clear understanding as to what happened or is happening. Collecting log data and aggregating it to present the data in a single, consolidated view achieves this objective.",
644
+ "severity": "medium"
645
+ },
646
+ {
647
+ "id": "V-27126",
648
+ "title": "The network element must provide a report generation capability.",
649
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple network elements to acquire a clear understanding as to what happened or is happening. Collecting log data and aggregating it to present the data in a single, consolidated report achieves this objective.",
650
+ "severity": "medium"
651
+ },
652
+ {
653
+ "id": "V-27129",
654
+ "title": "The network element must provide the capability to automatically process log records for events of interest based upon selectable criteria.",
655
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple network elements to acquire a clear understanding as to what happened or is happening. Collecting log data and enabling personnel to filter the data based on selection criteria to produce a meaningful view achieves this objective.",
656
+ "severity": "medium"
657
+ },
658
+ {
659
+ "id": "V-27133",
660
+ "title": "The network element must use internal system clocks to generate time stamps for audit records.",
661
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple network elements to acquire a clear understanding as to what happened or is happening. In order to correlate, time stamps are needed on all of the log records.",
662
+ "severity": "medium"
663
+ },
664
+ {
665
+ "id": "V-27138",
666
+ "title": "The network element must synchronize its internal clock on an organization-defined frequency with an organization-defined authoritative time source.",
667
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple network elements to acquire a clear understanding as to what happened or is happening. In order to correlate, time stamps are needed on all of the log records. Furthermore, the various components within the network infrastructure providing the log records must have their clocks synchronized using a common time reference so the events can be correlated in exact order of time.",
668
+ "severity": "medium"
669
+ },
670
+ {
671
+ "id": "V-27192",
672
+ "title": "The network element must protect audit information from unauthorized read access.",
673
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the collected log data from the various network elements as well as the auditing tool are secured and can only be accessed by authorized personnel.",
674
+ "severity": "medium"
675
+ },
676
+ {
677
+ "id": "V-27194",
678
+ "title": "The network element must protect audit information from unauthorized modification.",
679
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the collected log data from the various network elements as well as the auditing tool are secured and can only be accessed by authorized personnel.",
680
+ "severity": "medium"
681
+ },
682
+ {
683
+ "id": "V-27196",
684
+ "title": "The network element must protect audit information from unauthorized deletion.",
685
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the collected log data from the various network elements as well as the auditing tool are secured and can only be accessed by authorized personnel.",
686
+ "severity": "medium"
687
+ },
688
+ {
689
+ "id": "V-27199",
690
+ "title": "The network element must protect audit tools from unauthorized access.",
691
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the auditing tools are secured and can only be accessed by authorized personnel.",
692
+ "severity": "medium"
693
+ },
694
+ {
695
+ "id": "V-27201",
696
+ "title": "The network element must protect audit tools from unauthorized modification.",
697
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the auditing tools are secured and can only be accessed by authorized personnel.",
698
+ "severity": "medium"
699
+ },
700
+ {
701
+ "id": "V-27207",
702
+ "title": "The network element must protect audit tools from unauthorized deletion.",
703
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the auditing tools are secured and can only be accessed by authorized personnel.",
704
+ "severity": "medium"
705
+ },
706
+ {
707
+ "id": "V-27208",
708
+ "title": "The network element must produce audit records on hardware-enforced write-once media.",
709
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the collected log data from the various network elements is secured and stored on write-once media for safe keeping.",
710
+ "severity": "medium"
711
+ },
712
+ {
713
+ "id": "V-27213",
714
+ "title": "The network element must backup log records on an organization-defined frequency onto a different system or media.",
715
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the collected log data from the various network elements is secured and backed up regularly unto a different system or off-line media.",
716
+ "severity": "medium"
717
+ },
718
+ {
719
+ "id": "V-27218",
720
+ "title": "The network element must use cryptographic mechanisms to protect the integrity of audit information.",
721
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. Mechanisms such as a signed hash using asymmetric cryptography must be used to protect the integrity of integrity of the collected audit data.",
722
+ "severity": "medium"
723
+ },
724
+ {
725
+ "id": "V-27219",
726
+ "title": "The network element must use cryptography to protect the integrity of audit tools.",
727
+ "description": "Auditing and logging are key components of any security architecture. It is essential that security personnel know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify a network element that has been configured improperly. Mechanisms such as a signed hash using asymmetric cryptography must be used to protect the integrity of the audit tools used for audit reduction and reporting.",
728
+ "severity": "medium"
729
+ },
730
+ {
731
+ "id": "V-27223",
732
+ "title": "The network element must protect the audit records of non-local accesses to privileged accounts and the execution of privileged functions.",
733
+ "description": "Auditing may not be reliable when performed by the network element to which the user being audited has privileged access. The privileged user may inhibit auditing or modify audit records. This control enhancement helps mitigate this risk by requiring that privileged access be further defined between audit-related privileges and other privileges, thus, limiting the users with audit-related privileges. Reducing the risk of audit compromises by privileged users can also be achieved, for example, by performing audit activity on a separate information system or by using storage media that cannot be modified (e.g., write-once recording devices).",
734
+ "severity": "medium"
735
+ },
736
+ {
737
+ "id": "V-27225",
738
+ "title": "The network must element protect against an individual falsely denying having performed a particular action.",
739
+ "description": "Non-repudiation of actions taken by an administrator is required in order to maintain integrity of the configuration management process. This requires that all configuration changes to the network element are logged as well as requiring network administrators to authenticate with 2-factor authentication or PKI prior to acquiring administrative access to the network element. Together, these processes will ensure the administrators can be held accountable for the configuration changes they implement.",
740
+ "severity": "medium"
741
+ },
742
+ {
743
+ "id": "V-27228",
744
+ "title": "The information system must associate the identity of the information producer with the information.",
745
+ "description": "Network elements do not have information created and maintained by information owners nor do they transfer information.",
746
+ "severity": "medium"
747
+ },
748
+ {
749
+ "id": "V-27233",
750
+ "title": "The information system must validate the binding of the information producer’s identity to the information.",
751
+ "description": "Network elements are not incorporated for the purpose of creating information for production.",
752
+ "severity": "medium"
753
+ },
754
+ {
755
+ "id": "V-27234",
756
+ "title": "The information system must maintain reviewer/releaser identity and credentials within the established chain of custody for all information reviewed or released.",
757
+ "description": "Network elements are not incorporated for the purpose of creating information for production and release.",
758
+ "severity": "medium"
759
+ },
760
+ {
761
+ "id": "V-27235",
762
+ "title": "The information system must validate the binding of the reviewer’s identity to the information at the transfer/release point prior to release/transfer from one security domain to another security domain.",
763
+ "description": "Network elements do not have information for review that is released and transferred from one security domain to another.",
764
+ "severity": "medium"
765
+ },
766
+ {
767
+ "id": "V-27255",
768
+ "title": "The network element must compile log data from multiple components into a network-wide audit trail that is time-correlated to within organization-defined level of tolerance.",
769
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element.",
770
+ "severity": "medium"
771
+ },
772
+ {
773
+ "id": "V-27257",
774
+ "title": "The network element must produce a system-wide audit trail composed of log records in a standardized format.",
775
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element.",
776
+ "severity": "medium"
777
+ },
778
+ {
779
+ "id": "V-27258",
780
+ "title": "The network element must generate log records for organization-defined events determined to be significant and relevant to the security of the network infrastructure.",
781
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element.",
782
+ "severity": "medium"
783
+ },
784
+ {
785
+ "id": "V-27259",
786
+ "title": "The network element must allow administrators to select which events are to be logged by specific components of the system.",
787
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element.",
788
+ "severity": "medium"
789
+ },
790
+ {
791
+ "id": "V-27260",
792
+ "title": "The network element must generate audit records for organization-defined list of auditable events.",
793
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element.",
794
+ "severity": "medium"
795
+ },
796
+ {
797
+ "id": "V-27261",
798
+ "title": "The information system must initiate session audits at system start-up.",
799
+ "description": "Network elements do not provide user access. Hence, they would not provide any capability to enable users to establish a session. Therefore there would be no user session log information to capture and no reason to initiate a session audit; thereby making this vulnerability not applicable.",
800
+ "severity": "medium"
801
+ },
802
+ {
803
+ "id": "V-27262",
804
+ "title": "The information system must provide the capability to capture/record and log all content related to a user session.",
805
+ "description": "Network elements do not provide user access. Hence, they would not provide any capability to enable users to establish a session. Therefore there would be no user session log information to capture; thereby making this vulnerability not applicable.",
806
+ "severity": "medium"
807
+ },
808
+ {
809
+ "id": "V-27263",
810
+ "title": "The information system must provide the capability to remotely view/hear all content related to an established user session in real time.",
811
+ "description": "Users that establish sessions with network elements are administrators who have a session with the device for the sole purpose of administrative access. All in-band access sessions must be encrypted (SSH, HTTPS, etc.); hence, there is no way to capture and view the traffic remotely. There for this requirement would not be applicable.",
812
+ "severity": "medium"
813
+ },
814
+ {
815
+ "id": "V-27264",
816
+ "title": "The network element must enforce access restrictions associated with changes to the information system.",
817
+ "description": "Changes to the hardware or software components of the network element can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network element for implementing any changes or upgrades.",
818
+ "severity": "medium"
819
+ },
820
+ {
821
+ "id": "V-27265",
822
+ "title": "The network element must be configured to enable automated mechanisms to enforce access restrictions.",
823
+ "description": "Changes to the hardware or software components of the network element can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network element for implementing any changes or upgrades.",
824
+ "severity": "medium"
825
+ },
826
+ {
827
+ "id": "V-27267",
828
+ "title": "The network element must be configured to enable automated mechanisms to support auditing of the enforcement actions.",
829
+ "description": "Changes to the hardware or software components of the network element can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network element for implementing any changes or upgrades. Additionally, maintaining log records of access is essential for ensuring configuration change control is being implemented as intended and for supporting after-the-fact actions should the organization become aware of an unauthorized change to the information system.",
830
+ "severity": "medium"
831
+ },
832
+ {
833
+ "id": "V-27269",
834
+ "title": "The network element must prevent the installation of organization-defined critical software programs not signed with a certificate that is recognized and approved by the organization.",
835
+ "description": "Changes to any software components of the network element can have significant effects on the overall security of the network. Verifying the authenticity of the software prior to installation validates the integrity of the patch or upgrade received from a vendor. This ensures the software has not been tampered with and that it has been provided by a trusted vendor.",
836
+ "severity": "medium"
837
+ },
838
+ {
839
+ "id": "V-27273",
840
+ "title": "The network element must enforce a two-person rule for changes to organization-defined information system components and system-level information.",
841
+ "description": "Changes to any software components of the network element can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network element for implementing any changes or upgrades to system components. Enforcing a two-person rule will ensure the changes have been approved.",
842
+ "severity": "medium"
843
+ },
844
+ {
845
+ "id": "V-27287",
846
+ "title": "The network element must limit privileges to change software resident within software libraries.",
847
+ "description": "Changes to any software components of the network element can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network element for implementing any changes or upgrades. If the network element were to enable non-authorized users to make changes to software libraries, those changes could be implemented without undergoing the appropriate testing, validation, and approval.",
848
+ "severity": "medium"
849
+ },
850
+ {
851
+ "id": "V-27289",
852
+ "title": "The network element must implement automatic safeguards and countermeasures if security functions or mechanisms are changed inappropriately.",
853
+ "description": "Changes to any software components of the network element can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network element for implementing any changes or upgrades. In order to ensure a prompt response to unauthorized changes to network element security functions, the organizations may define safeguards the device shall undertake in the event these changes occur.",
854
+ "severity": "medium"
855
+ },
856
+ {
857
+ "id": "V-27291",
858
+ "title": "The network element must employ automated mechanisms to centrally manage configuration settings.",
859
+ "description": "Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for network elements can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an aid for troubleshooting network problems.",
860
+ "severity": "medium"
861
+ },
862
+ {
863
+ "id": "V-27292",
864
+ "title": "The network element must employ automated mechanisms to centrally apply configuration settings.",
865
+ "description": "Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for network elements can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an aid for troubleshooting network problems.",
866
+ "severity": "medium"
867
+ },
868
+ {
869
+ "id": "V-27293",
870
+ "title": "The network element must employ automated mechanisms to centrally verify configuration settings.",
871
+ "description": "Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for network elements can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an aid for troubleshooting network problems.",
872
+ "severity": "medium"
873
+ },
874
+ {
875
+ "id": "V-27295",
876
+ "title": "The network element must employ automated mechanisms to respond to unauthorized changes to organization-defined configuration settings.",
877
+ "description": "Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for network elements can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an automatic mechanism to initiate an alert when an unauthorized change has been detected.",
878
+ "severity": "medium"
879
+ },
880
+ {
881
+ "id": "V-27296",
882
+ "title": "The network element must ensure that detected unauthorized security-relevant configuration changes are tracked.",
883
+ "description": "Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for network elements can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an automatic mechanism to track detected unauthorized security-relevant configuration changes.",
884
+ "severity": "medium"
885
+ },
886
+ {
887
+ "id": "V-27298",
888
+ "title": "The network element must not have unnecessary services and capabilities enabled.",
889
+ "description": "A compromised network element introduces risk to the entire network infrastructure as well as data resources that are accessible via the network. The perimeter defense has no oversight or control of attacks by malicious users within the network. To prevent network breaches from within is dependent on implementing a comprehensive defense-in-depth strategy including securing each device connected to it. This is accomplished by following and implementing all security guidance applicable for each node type. A fundamental step in securing each network element is to only enable the capabilities required for operation.",
890
+ "severity": "medium"
891
+ },
892
+ {
893
+ "id": "V-27301",
894
+ "title": "The network element must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and services.",
895
+ "description": "A compromised network element introduces risk to the entire network infrastructure as well as data resources that are accessible via the network. The perimeter defense has no oversight or control of attacks by malicious users within the network. To prevent network breaches from within is dependent on implementing a comprehensive defense-in-depth strategy including securing each device connected to it. This is accomplished by following and implementing all security guidance applicable for each node type. A fundamental step in securing each network element is to only enable the ports, protocols, and services required for operation.",
896
+ "severity": "medium"
897
+ },
898
+ {
899
+ "id": "V-27302",
900
+ "title": "The network element must employ automated mechanisms to prevent program execution in accordance with organization defined specifications.",
901
+ "description": "A compromised network element introduces risk to the entire network infrastructure as well as data resources accessible via the network. The perimeter defense has no oversight or control of attacks by malicious users within the network. To prevent network breaches from within is dependent on implementing a comprehensive defense-in-depth strategy including securing each device connected to it. This is accomplished by following and implementing all security guidance applicable for each node type. A fundamental step in securing each network element is to only enable the services required for operation. Any form of automatic execution should be disabled as it can easily be exploited by hackers to infect hosts with malware and viruses.",
902
+ "severity": "medium"
903
+ },
904
+ {
905
+ "id": "V-27303",
906
+ "title": "The network element must employ automated mechanisms to detect the addition of unauthorized components or devices. The monitoring may be accomplished on an ongoing basis or by the periodic scanning. Automated mechanisms can be implemented within the network element or in a separate system.",
907
+ "description": "Centrally managing configuration changes for network elements can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an automatic mechanism to track the status of applicable vulnerabilities. Keeping an up-to-date inventory of all network elements and their components provides the framework for the implementation of a comprehensive configuration and problem management system. An inventory of components and their features provides a mechanism for tracking vulnerabilities of effected products which can be used for automated patch management and upgrades.",
908
+ "severity": "medium"
909
+ },
910
+ {
911
+ "id": "V-27304",
912
+ "title": "The information system must implement transaction recovery for systems that are transaction-based.",
913
+ "description": "A network element will not have transactions.",
914
+ "severity": "medium"
915
+ },
916
+ {
917
+ "id": "V-27305",
918
+ "title": "The network element must support organizational requirements to conduct backups of user-level information contained in the device per organization-defined frequency that is consistent with recovery time and recovery point objectives.",
919
+ "description": "User information contained on a network element is associated to the users account and the resources the user is authorized to access. If this information becomes corrupted by hardware failures or by a malicious user, it must be restored immediately to ensure network access availability. Backing up this information is a critical step for data recovery.",
920
+ "severity": "medium"
921
+ },
922
+ {
923
+ "id": "V-27306",
924
+ "title": "The network element must support organizational requirements to conduct backups of system-level information contained in the information system per organization-defined frequency.",
925
+ "description": "System information contained on a network element contains default and customized attributes as well as software required for the execution and operation of the device. If this information becomes corrupted by hardware failures or by a malicious user, it must be restored immediately to ensure network availability. Backing up this information is a critical step for data recovery.",
926
+ "severity": "medium"
927
+ },
928
+ {
929
+ "id": "V-27307",
930
+ "title": "The network element must support organizational requirements to conduct backups of information system documentation including security-related documentation per organization-defined frequency that is consistent with recovery time and recovery point objectives.",
931
+ "description": "System information contained on a network element contains default and customized attributes as well as software required for the execution and operation of the device. If this information becomes corrupted by hardware failures or by a malicious user, it must be restored immediately to ensure network availability. Backing up this information is a critical step for data recovery.",
932
+ "severity": "medium"
933
+ },
934
+ {
935
+ "id": "V-27308",
936
+ "title": "The network element must enforce the identification and authentication of all organizational users.",
937
+ "description": "Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organization’s security policy. Access to the network must be categorized as administrator, user, or guest so the appropriate authorization can be assigned to the user requesting access to the network or a network element. Authorization requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of user identities is accomplished through the use of passwords, tokens, biometrics, or in the case of multi-factor authentication, some combination thereof. Lack of authentication enables anyone to gain access to the network or possibly a network element providing opportunity for intruders to compromise resources within the network infrastructure.",
938
+ "severity": "medium"
939
+ },
940
+ {
941
+ "id": "V-27309",
942
+ "title": "The network element must use multifactor authentication for network access to privileged accounts.\n",
943
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g., password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nA privileged account is defined as: \nAn information system account with authorizations of a privileged user. \n\nNetwork Access is defined as: \nAccess to an information system by a user (or a process acting on behalf of a user) communicating through a network (e.g., local area network, wide area network, Internet).",
944
+ "severity": "medium"
945
+ },
946
+ {
947
+ "id": "V-27310",
948
+ "title": "The network element must use multifactor authentication for network access to non-privileged accounts.",
949
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g., password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nA non-privileged account is defined as: \nAn information system account with authorizations of a regular or non-privileged user. \n\nNetwork Access is defined as: \nAccess to an information system by a user (or a process acting on behalf of a user) communicating through a network (e.g., local area network, wide area network, Internet).",
950
+ "severity": "medium"
951
+ },
952
+ {
953
+ "id": "V-27311",
954
+ "title": "The network element must use multifactor authentication for local access to privileged accounts.\n",
955
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g., password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nA privileged account is defined as: An information system account with authorizations of a privileged user. \n\nLocal Access is defined as access to an organizational information system by a user (or process acting on behalf of a user) communicating through a direct connection without the use of a network.",
956
+ "severity": "medium"
957
+ },
958
+ {
959
+ "id": "V-27312",
960
+ "title": "The network element must use multifactor authentication for local access to non-privileged accounts.",
961
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g., password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nA non-privileged account is defined as: An information system account with authorizations of a regular or non-privileged user. \n\nLocal Access is defined as access to an organizational information system by a user (or process acting on behalf of a user) communicating through a direct connection without the use of a network.",
962
+ "severity": "medium"
963
+ },
964
+ {
965
+ "id": "V-27313",
966
+ "title": "The network element must support organizational requirements to ensure individuals are authenticated with an individual authenticator prior to using a group authenticator.\n",
967
+ "description": "To assure individual accountability and prevent unauthorized access, organizational users shall be individually identified and authenticated. \n\nOrganizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, individuals from allied nations). \n\nUsers (and any processes acting on behalf of users) need to be uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization which outlines specific user actions that can be performed on the information system without identification or authentication.",
968
+ "severity": "medium"
969
+ },
970
+ {
971
+ "id": "V-27314",
972
+ "title": "The network element must enforce multifactor authentication for network access to privileged accounts where one of the factors is provided by a device separate from the network element being accessed.",
973
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g., password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nA privileged account is defined as: An information system account with authorizations of a privileged user. \n\nWhen one of the authentication factors is provided by a device that is separate from the system that is gaining access, this is referred to as \"out of band two factor authentication\". OOB2FA employs separate communication channels at least one of which is independently maintained and trusted to authenticate an end user. One channel could be a mobile device that is registered to the user. Upon a logon attempt, the system sends instructions to the device in the form of on-screen prompts that instruct the user how to complete the login process.",
974
+ "severity": "medium"
975
+ },
976
+ {
977
+ "id": "V-27315",
978
+ "title": "The network element must enforce multifactor authentication for network access to non-privileged accounts where one of the factors is provided by a device separate from the network element being accessed.",
979
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g., password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nA non-privileged account is defined as: An information system account with authorizations of a regular or non-privileged user. \n\nWhen one of the authentication factors is provided by a device that is separate from the system that is gaining access, this is referred to as \"out of band 2 factor authentication\".",
980
+ "severity": "medium"
981
+ },
982
+ {
983
+ "id": "V-27316",
984
+ "title": "The network element must use organization-defined replay-resistant authentication mechanisms for network access to privileged accounts.",
985
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. The authenticator must be a separate device than the target device for which the individual is requesting access to. Hence all authentication credentials must be maintained on an authentication server. Messages between the authenticator and the network element validating user credentials must not be vulnerable to a replay attack possibly enabling an unauthorized user to gain access to any network element. A replay attack is a form of a network attack in which a valid session or series of IP packets is intercepted by a malicious user who at a later time transmits the packets to gain access to the target device.",
986
+ "severity": "medium"
987
+ },
988
+ {
989
+ "id": "V-27317",
990
+ "title": "The network element must use organization-defined replay-resistant authentication mechanisms for network access to non-privileged accounts.",
991
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. The authenticator must be a separate device than the target device for which the individual is requesting access to. Therefore, all authentication credentials must be maintained on an authentication server. Messages between the authenticator and the network element validating user credentials must not be vulnerable to a replay attack possibly enabling an unauthorized user to gain access to any network element. A replay attack is a form of a network attack in which a valid session or series of IP packets is intercepted by a malicious user who at a later time transmits the packets to gain access to the target device.",
992
+ "severity": "medium"
993
+ },
994
+ {
995
+ "id": "V-27318",
996
+ "title": "The network element must authenticate an organization-defined list of specific devices by device type before establishing a connection.",
997
+ "description": "A network element must have a level of trust with any node wanting to connect to it. The remote node could be a host device requiring a layer 2 connection to the network or a router wanting to peer as a neighbor and establish a connection to exchange control plane and forwarding plane traffic. A network control plane is comprised of routing, signaling, and link management protocols; all used to establish the forwarding paths required by the data plane. Disrupting the flow of this information or injecting false information breaks down the integrity or believability of path information.",
998
+ "severity": "medium"
999
+ },
1000
+ {
1001
+ "id": "V-27319",
1002
+ "title": "The network element must authenticate devices before establishing remote network connections using bidirectional authentication between cryptographically based devices.",
1003
+ "description": "A network element must have a level of trust with any node wanting to connect to it. The remote node could be a host device requiring a layer 2 connection to the network or a router wanting to peer as a neighbor and establish a connection to exchange control plane and forwarding plane traffic. A network control plane is comprised of routing, signaling, and link management protocols; all used to establish the forwarding paths required by the data plane. Disrupting the flow of this information or injecting false information breaks down the integrity or believability of path information. To safeguard these connections it is imperative the connecting device authenticate itself prior to granting access. In the case of peering neighbors, the authentication must be bidirectional. Regardless of the paradigm, authentication must use a form of cryptography to ensure a high level of trust and authenticity.",
1004
+ "severity": "medium"
1005
+ },
1006
+ {
1007
+ "id": "V-27320",
1008
+ "title": "The network element must authenticate devices before establishing wireless network connections using bidirectional authentication between cryptographically based devices.",
1009
+ "description": "Without authentication, an unauthorized user can easily connect to a nearby access-point (AP) within the enclave. In addition, a rogue AP owned by an attacker can accept connections from wireless stations enabling it to intercept traffic and initiate man-in-the-middle attacks before allowing traffic to flow to the intended host. Hence, it is imperative that authentication is bi-directional using cryptography to ensure a high level of trust and authenticity.",
1010
+ "severity": "medium"
1011
+ },
1012
+ {
1013
+ "id": "V-27330",
1014
+ "title": "The network element must authenticate devices before establishing network connections using bidirectional authentication between cryptographically based devices.",
1015
+ "description": "A network element must have a level of trust with any node wanting to connect to it. The remote node could be a host device requiring a layer 2 connection to the network or a router wanting to peer as a neighbor and establish a connection to exchange control plane and forwarding plane traffic. A network control plane is comprised of routing, signaling, and link management protocols; all used to establish the forwarding paths required by the data plane. Disrupting the flow of this information or injecting false information breaks down the integrity or believability of path information. To safeguard these connections it is imperative the connecting device authenticate itself prior to granting access. In the case of peering neighbors, the authentication must be bidirectional. Regardless of the paradigm, authentication must use a form of cryptography to ensure a high level of trust and authenticity.",
1016
+ "severity": "medium"
1017
+ },
1018
+ {
1019
+ "id": "V-27331",
1020
+ "title": "The network element must dynamically manage identifiers, attributes, and associated access authorizations to enable user access to the network with the appropriate and authorized privileges. ",
1021
+ "description": "Web services are web applications that provide a method of communication between two or more different electronic devices. They are normally used by applications to provide each other with data. \n\nThe W3C defines a web service as;\n\"a software system designed to support interoperable machine to machine interaction over a network. It has an interface described in a machine processable format (specifically Web Services Description Language or WSDL). Other systems interact with the web service in a manner prescribed by its description using SOAP messages typically conveyed using HTTP with an XML serialization in conjunction with other web-related standards\".\n\nWeb services provide different challenges in managing access than what is presented by typical user based applications. In contrast to conventional access control approaches which employ static information system accounts and predefined sets of user privileges, many service-oriented architecture implementations rely on run time access control decisions facilitated by dynamic privilege management. While user identities remain relatively constant over time, user privileges may change more frequently based on the ongoing mission/business requirements and operational needs of the organization. \n\nIn contrast to conventional approaches to identification and authentication which employ static information system accounts for preregistered users, many service-oriented architecture implementations rely on establishing identities at run time for entities that were previously unknown. Dynamic establishment of identities and association of attributes and privileges with these identities are anticipated and provisioned. Pre-established trust relationships and mechanisms with appropriate authorities to validate identities and related credentials are essential.",
1022
+ "severity": "medium"
1023
+ },
1024
+ {
1025
+ "id": "V-27332",
1026
+ "title": "The network element must support organizational requirements to disable the user identifiers after an organization-defined time period of inactivity.",
1027
+ "description": "Inactive user accounts pose a risk to systems and applications. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to the operating system. Operating systems need to track periods of user inactivity and disable accounts after an organization-defined period of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised.",
1028
+ "severity": "medium"
1029
+ },
1030
+ {
1031
+ "id": "V-27333",
1032
+ "title": "The network element must enforce minimum password length.",
1033
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Password length is one factor in determining password strength. Use of a longer password string will exponentially increase the time and/or resources required to compromise the password.",
1034
+ "severity": "medium"
1035
+ },
1036
+ {
1037
+ "id": "V-27334",
1038
+ "title": "The network element must prohibit password reuse for the organization-defined number of generations.",
1039
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. A password must have an expiration date to limit the amount of time a compromised password can be used by a malicious user.",
1040
+ "severity": "medium"
1041
+ },
1042
+ {
1043
+ "id": "V-27335",
1044
+ "title": "The network element must enforce password complexity by the number of upper case characters used.",
1045
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Combination of upper case, lower case, numbers, and special characters enhances the complexity of the password string.",
1046
+ "severity": "medium"
1047
+ },
1048
+ {
1049
+ "id": "V-27336",
1050
+ "title": "The network element must enforce password complexity by the number of lower case characters used.",
1051
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Combination of upper case, lower case, numbers, and special characters enhances the complexity of the password string.",
1052
+ "severity": "medium"
1053
+ },
1054
+ {
1055
+ "id": "V-27337",
1056
+ "title": "The network element must enforce password complexity by the number of numeric characters used.",
1057
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Combination of upper case, lower case, numbers, and special characters enhances the complexity of the password string.",
1058
+ "severity": "medium"
1059
+ },
1060
+ {
1061
+ "id": "V-27339",
1062
+ "title": "The network element must enforce the number of characters changed when passwords are changed.",
1063
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. It is imperative when changing the password it results in a password not similar to the previous password.",
1064
+ "severity": "medium"
1065
+ },
1066
+ {
1067
+ "id": "V-27340",
1068
+ "title": "The network element must enforce password encryption for storage.",
1069
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Network elements can be compromised by personnel with physical access to the communication room. It is imperative for passwords to be stored encrypted, so they cannot be viewed by unauthorized staff.",
1070
+ "severity": "medium"
1071
+ },
1072
+ {
1073
+ "id": "V-27341",
1074
+ "title": "The network element must enforce password encryption for transmission.",
1075
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. Network elements can be compromised by personnel with access to the network. Passwords sent in the clear can be intercepted and used by unauthorized personnel to gain administrative access to network elements. It is imperative to encrypt passwords before transmitting during any authentication process.",
1076
+ "severity": "medium"
1077
+ },
1078
+ {
1079
+ "id": "V-27342",
1080
+ "title": "The network element must enforce minimum password lifetime restrictions.",
1081
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. A password must have an expiration date to limit the amount of time a compromised password can be used by a malicious user. However, changing the password too frequently may result in the user changing a small portion of the password, or the user could mishandle the password in an attempt to remember the new password.",
1082
+ "severity": "medium"
1083
+ },
1084
+ {
1085
+ "id": "V-27343",
1086
+ "title": "The network element must enforce maximum password lifetime restrictions.",
1087
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. A password must have an expiration date to limit the amount of time a compromised password can be used by a malicious user.",
1088
+ "severity": "medium"
1089
+ },
1090
+ {
1091
+ "id": "V-27344",
1092
+ "title": "The network element must validate certificates used for PKI-based authentication by constructing a certification path with status information to an accepted trust anchor.",
1093
+ "description": "A trust anchor is an authoritative entity represented via a public key. Within a chain of trust, the top entity to be trusted is the \"root certificate\" or \"trust anchors\" such as a Certification Authority (CA). A certification path starts with the Subject certificate and proceeds through a number of intermediate certificates up to a trusted root certificate, typically issued by a trusted CA. Path validation is necessary for a relying party to make an informed trust decision when presented with any certificate not already explicitly trusted.",
1094
+ "severity": "medium"
1095
+ },
1096
+ {
1097
+ "id": "V-27345",
1098
+ "title": "The network element must enforce authorized access to the corresponding private key for PKI-based authentication.",
1099
+ "description": "The principle factor of PKI implementation is the private key used to encrypt or digitally sign information. If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure.",
1100
+ "severity": "medium"
1101
+ },
1102
+ {
1103
+ "id": "V-27346",
1104
+ "title": "The network element must map the authenticated identity to the user account for PKI-based authentication.",
1105
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure that only the assigned individual is using the account, the account must be bound to a user certificate when PKI-based authentication is implemented.",
1106
+ "severity": "medium"
1107
+ },
1108
+ {
1109
+ "id": "V-27347",
1110
+ "title": "The network element must obscure feedback of authentication information during the authentication process to protect the information from possible use by unauthorized individuals.",
1111
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure that only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. During the authentication process, malicious users can gain knowledge of passwords during authentication process by sniffing local traffic between the network element and the authentication server or even walking by a user logging on and viewing what had been keyed in. It is imperative the network element prevents any form of authentication feedback that can be used to learn account passwords.",
1112
+ "severity": "medium"
1113
+ },
1114
+ {
1115
+ "id": "V-27348",
1116
+ "title": "The network element must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.",
1117
+ "description": "Network elements not protected with strong passwords provide the opportunity for anyone to crack the password thus gaining access to the system and the network. All passwords must be kept and known only by the account user who created the password. Malicious users can gain knowledge of passwords during authentication process by sniffing local traffic between the network element and the authentication server. It is imperative the authentication process implements cryptographic modules adhering to the higher standards approved by the federal government.",
1118
+ "severity": "medium"
1119
+ },
1120
+ {
1121
+ "id": "V-27349",
1122
+ "title": "The network element must uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.",
1123
+ "description": "Non-organizational users shall be uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization when related to the use of anonymous access. Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organizations security policy. Access to the network must be categorized as administrator, user, or guest so that the appropriate authorization can be assigned to the user requesting access to the network or a network element. Authorization requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of user identities is accomplished through the use of passwords, tokens, biometrics, or in the case of multifactor authentication, some combination thereof. Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity for intruders to compromise resources within the network infrastructure. By identifying and authenticating non-organizational users, their access to network resources can be restricted accordingly.",
1124
+ "severity": "medium"
1125
+ },
1126
+ {
1127
+ "id": "V-27350",
1128
+ "title": "The network element must be configured to automatically disable the device if any of the organization-defined list of security violations are detected.",
1129
+ "description": "To reduce or eliminate the risk of the network or the network element itself to be compromised, the device must be configured to disable itself depending on the violation or when it is not able to contain or thwart an attack.",
1130
+ "severity": "medium"
1131
+ },
1132
+ {
1133
+ "id": "V-27351",
1134
+ "title": "The network element must employ automated mechanisms to assist in the tracking of security incidents.",
1135
+ "description": "Despite the investment in perimeter defense technologies, enclaves are still faced with detecting, analyzing, and remediating network breaches and exploits that have made it past the firewall. An automated incident response infrastructure allows network operations to immediately react to incidents by identifying, analyzing, and mitigating any compromised network or network elements. Incident response teams can perform root cause analysis, determine how the exploit proliferated, identify all affected nodes, as well as, contain and eliminate the threat.",
1136
+ "severity": "medium"
1137
+ },
1138
+ {
1139
+ "id": "V-27352",
1140
+ "title": "The organization must check all media containing diagnostic and test programs for malicious code before the media are used in the information system.",
1141
+ "description": "This requirement is to ensure that the media containing the application is scanned for malicious code prior to use. Hence, this would not be specific to a network element as it is a procedure for validate the media before it is used by an information system.",
1142
+ "severity": "medium"
1143
+ },
1144
+ {
1145
+ "id": "V-27353",
1146
+ "title": "The network element must automate mechanisms to restrict the use of maintenance tools to authorized personnel only.",
1147
+ "description": "With the growth of widespread network-delivered malware infections, organizations tend to overlook the spread of malware from system to system through removable media. Once an infected media is connected to the information system, any worms on it will spread through the system. Maintenance tools connecting to a network element for diagnostics could be carrying malware; therefore, their use must be restricted to authorized personnel.",
1148
+ "severity": "medium"
1149
+ },
1150
+ {
1151
+ "id": "V-27354",
1152
+ "title": "The network element must log non-local maintenance and diagnostic sessions.",
1153
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. For sound configuration management, it is imperative events associated with a non-local administrative access or diagnostic session be logged.",
1154
+ "severity": "medium"
1155
+ },
1156
+ {
1157
+ "id": "V-27355",
1158
+ "title": "The network element must protect non-local maintenance sessions through the use of multifactor authentication.",
1159
+ "description": "Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity for intruders to compromise resources within the network infrastructure. Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organizations security policy. Authorization for access to any network element requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of all administrator accounts for all privilege levels must be accomplished using two or more factors that include the following:\n\n(i) something you know (e.g., password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric).",
1160
+ "severity": "medium"
1161
+ },
1162
+ {
1163
+ "id": "V-27358",
1164
+ "title": "The organization (or information system) must enforce explicit rules governing the installation of software by users.",
1165
+ "description": "Installation of software cannot be done on network appliances. Restrictions for any of the servers (NTP, syslog, AAA, etc.) would be covered under the OS SRG.",
1166
+ "severity": "medium"
1167
+ },
1168
+ {
1169
+ "id": "V-27359",
1170
+ "title": "The information system must not share resources used to interface with systems operating at different security levels.",
1171
+ "description": "A network element will not be interfacing with domains at different security levels.",
1172
+ "severity": "medium"
1173
+ },
1174
+ {
1175
+ "id": "V-27360",
1176
+ "title": "The information system must fail securely in the event of an operational failure of a boundary protection device.",
1177
+ "description": "Network elements cannot be taken down as a result of any upstream security violations or failures. If a network at the edge shuts down -- traffic will not enter nor exit.",
1178
+ "severity": "medium"
1179
+ },
1180
+ {
1181
+ "id": "V-27361",
1182
+ "title": "The information system must prevent remote devices that have established a non-remote connection with the system from communicating outside of the communications path with resources in external networks.",
1183
+ "description": "There is no way a network element connected to another node (via non-remote connection) is able to prevent one node from communicating to another node in an external network because the path may not necessarily be through the subject network element.",
1184
+ "severity": "medium"
1185
+ },
1186
+ {
1187
+ "id": "V-27363",
1188
+ "title": "The information system or supporting environment must block both inbound and outbound traffic between instant messaging clients independently configured by end users and external service providers.",
1189
+ "description": "There are no network elements within the network infrastructure that are collaborative computing devices.",
1190
+ "severity": "medium"
1191
+ },
1192
+ {
1193
+ "id": "V-27365",
1194
+ "title": "The organization must prohibit remote activation of collaborative computing devices excluding the organization-defined exceptions where remote activation is allowed.",
1195
+ "description": "There are no network elements within the network infrastructure that are collaborative computing devices.",
1196
+ "severity": "medium"
1197
+ },
1198
+ {
1199
+ "id": "V-27366",
1200
+ "title": "The organization must ensure the development of mobile code being deployed in information systems meeting organization-defined mobile code requirements.",
1201
+ "description": "Development of mobile code is not applicable to network elements.",
1202
+ "severity": "medium"
1203
+ },
1204
+ {
1205
+ "id": "V-27367",
1206
+ "title": "The network element must prevent the download of prohibited mobile code.",
1207
+ "description": "Decisions regarding the employment of mobile code within network elements are based on the potential for the code to cause damage to the system if used maliciously. Mobile code technologies include, for example, Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript.",
1208
+ "severity": "medium"
1209
+ },
1210
+ {
1211
+ "id": "V-27369",
1212
+ "title": "The network element must protect non-local maintenance sessions by separating the maintenance session from other network sessions with the device by either physically separated communications paths, or logically separated communications paths based upon encryption.",
1213
+ "description": "Network management is the process of monitoring network elements and links, configuring network elements, and enabling network services. Network management also includes the collection of performance, diagnostics, and other relevant data about each element to ensure availability and that services are being delivered to meet or exceed service level agreements. Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. From an architectural perspective, implementing out-of-band (OOB) management for network elements is a best practice and the first step in the deployment of a management network. OOBM networks isolate network users from communication channels dedicated to network management and thereby provide traffic separation to increase security for all network management activities. The management network should have a direct link with local connection to the managed network elements. Where this is not possible, the management traffic can traverse over the production network or transient IP backbone via private encrypted tunnel.",
1214
+ "severity": "medium"
1215
+ },
1216
+ {
1217
+ "id": "V-27370",
1218
+ "title": "The network element must employ cryptographic mechanisms to protect the integrity and confidentiality of non-local maintenance and diagnostic communications.",
1219
+ "description": "Network management is the process of monitoring network elements and links, configuring network elements, and enabling network services. Network management also includes the collection of performance, diagnostics, and other relevant data about each element to ensure availability and that services are being delivered to meet or exceed service level agreements. Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. To protect the integrity and confidentiality of non-local maintenance and diagnostics, all packets associated with these sessions must be encrypted.",
1220
+ "severity": "medium"
1221
+ },
1222
+ {
1223
+ "id": "V-27371",
1224
+ "title": "The network element must prevent the automatic execution of mobile code in organization-defined software applications and requires organization-defined actions prior to executing the code.",
1225
+ "description": "Decisions regarding the employment of mobile code within network elements are based on the potential for the code to cause damage to the system if used maliciously. Mobile code technologies include, for example, Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript.",
1226
+ "severity": "medium"
1227
+ },
1228
+ {
1229
+ "id": "V-27372",
1230
+ "title": "The network element must enforce identification and authentication for the establishment of non-local maintenance and diagnostic sessions.",
1231
+ "description": "Lack of authentication enables anyone to gain access to the network or possibly a network element providing opportunity for intruders to compromise resources within the network infrastructure. Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organizations security policy. Authorization for access to any network element to perform maintenance and diagnostics requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of non-local maintenance and diagnostics sessions must be accomplished through two-factor authentication via the combination of passwords, tokens, and biometrics.",
1232
+ "severity": "medium"
1233
+ },
1234
+ {
1235
+ "id": "V-27373",
1236
+ "title": "The network element must employ malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means.",
1237
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Malicious code can be transported by electronic mail, mail attachments, Web accesses, and removable media.",
1238
+ "severity": "medium"
1239
+ },
1240
+ {
1241
+ "id": "V-27374",
1242
+ "title": "The network element must terminate all sessions when non-local maintenance is completed.",
1243
+ "description": "In the event the remote node has abnormally terminated or an upstream link from the managed device is down, the management session will be terminated; thereby, freeing device resources and eliminating any possibility of an unauthorized user being orphaned to an open idle session of the managed device.",
1244
+ "severity": "medium"
1245
+ },
1246
+ {
1247
+ "id": "V-27375",
1248
+ "title": "The network element must use cryptographic mechanisms to protect and restrict access to information on portable digital media.",
1249
+ "description": "When data is written to portable digital media, there is risk of loss of data along with integrity and data confidentiality. An organizational assessment of risk guides the selection of media and associated information contained on the media requiring restricted access. Organizations document in policy and procedures, the media requiring restricted access, individuals authorized to access the media, and the specific measures taken to restrict access. Fewer protection measures are needed for media containing information determined by the organization to be in the public domain, to be publicly releasable, or to have limited or no adverse impact if accessed by other than authorized personnel. In these situations, it is assumed the physical access controls where the media resides provide adequate protection.",
1250
+ "severity": "medium"
1251
+ },
1252
+ {
1253
+ "id": "V-27376",
1254
+ "title": "The network element must employ cryptographic mechanisms to protect information in storage.",
1255
+ "description": "When data is written to digital media, there is risk of loss of data along with integrity and data confidentiality. An organizational assessment of risk guides the selection of media and associated information contained on the media requiring physical protection. Fewer protection measures are needed for media containing information determined by the organization to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on the organization or individuals if accessed by other than authorized personnel. In these situations, it is assumed the physical access controls to the facility where the media resides provide adequate protection. \n\nAs part of a defense-in-depth strategy, the organization considers routinely encrypting information at rest on selected secondary storage devices. The employment of cryptography is at the discretion of the information owner/steward. The selection of the cryptographic mechanisms used is based upon maintaining the confidentiality and integrity of the information. The strength of mechanisms is commensurate with the classification and sensitivity of the information.\n",
1256
+ "severity": "medium"
1257
+ },
1258
+ {
1259
+ "id": "V-27377",
1260
+ "title": "The information system must provide additional data origin and integrity artifacts along with the authoritative data the system returns in response to name/address resolution queries.",
1261
+ "description": "Secure Name/Address Resolution Service family is not applicable. DNS is covered under the Application SRG.",
1262
+ "severity": "medium"
1263
+ },
1264
+ {
1265
+ "id": "V-27378",
1266
+ "title": "The network element must employ automated mechanisms to detect the presence of unauthorized software on organizational information systems and notify designated organizational officials in accordance with the organization-defined frequency.",
1267
+ "description": "Malicious software such as Trojan horses, hacker tools, DDoS (Distributed Denial of Service) agents, and spyware can establish a base on individual desktops and servers. Many of these are not detected by anti-virus software or even host intrusion detection systems. Once they have residency within the network, unauthorized users are able to breach firewalls and access sensitive data by assuming the identity of authorized users. The goal of running vulnerability assessment scans is to identify devices on your network that are open to known vulnerabilities.",
1268
+ "severity": "medium"
1269
+ },
1270
+ {
1271
+ "id": "V-27379",
1272
+ "title": "The network element must separate user traffic from network management traffic.",
1273
+ "description": "Network management is the process of monitoring network elements and links, configuring network elements to turn up and disable network services, the collection of performance, diagnostics, and other relevant data about each element to ensure availability and that services are being delivered to meet or exceed service level agreements. Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. From an architectural perspective, implementing out-of-band (OOB) management for network elements is a best practice and the first step in the deployment of a management network. OOBM networks isolate network users from communication channels dedicated to network management and thereby provide traffic separation to increase security for all network management activities.",
1274
+ "severity": "medium"
1275
+ },
1276
+ {
1277
+ "id": "V-27380",
1278
+ "title": "The network element must prevent the exposure of network management traffic onto a user or production network.",
1279
+ "description": "Network management is the process of monitoring network elements and links, configuring network elements to turn up and disable network services, the collection of performance, diagnostics, and other relevant data about each element to ensure availability and that services are being delivered to meet or exceed service level agreements. Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. From an architectural perspective, implementing out of band (OOB) management for network elements is a best practice and the first step in the deployment of a management network. OOBM networks isolate network users from communication channels dedicated to network management and thereby provide traffic separation to increase security for all network management activities. A network element must be configured to prevent the leak of management traffic into the production network and vice versa.",
1280
+ "severity": "medium"
1281
+ },
1282
+ {
1283
+ "id": "V-27381",
1284
+ "title": "The network element must isolate security functions from non-security functions.",
1285
+ "description": "The network element isolates security functions from non-security functions by means of an isolation boundary (implemented via partitions and domains) controlling access to and protects the integrity of, the hardware, software, and firmware performing those security functions. The network element maintains a separate execution domain (e.g., address space) for each executing process.",
1286
+ "severity": "medium"
1287
+ },
1288
+ {
1289
+ "id": "V-27383",
1290
+ "title": "The network element must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.",
1291
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Malicious code can be transported by electronic mail, mail attachments, Web accesses, and removable media.",
1292
+ "severity": "medium"
1293
+ },
1294
+ {
1295
+ "id": "V-27384",
1296
+ "title": "The network element must isolate security functions enforcing access and information flow control from both non-security functions and from other security functions.",
1297
+ "description": "The network element isolates security functions from non-security functions by means of an isolation boundary (implemented via partitions and domains) controlling access to and protects the integrity of, the hardware, software, and firmware performing those security functions. The network element maintains a separate execution domain (e.g., address space) for each executing process.",
1298
+ "severity": "medium"
1299
+ },
1300
+ {
1301
+ "id": "V-27385",
1302
+ "title": "The network element must fail to an organization-defined known-state for organization-defined types of failures.",
1303
+ "description": "Failure in a known state can address safety or security in accordance with the mission needs of the organization. Failure in a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system.",
1304
+ "severity": "medium"
1305
+ },
1306
+ {
1307
+ "id": "V-27386",
1308
+ "title": "The network element must provide the means to indicate the security status of child subspaces and (if the child supports secure resolution services) enable verification of a chain of trust among parent and child domains when operating as part of a distributed, hierarchical namespace.",
1309
+ "description": "This control enables remote clients to obtain origin authentication and integrity verification assurances for the host/service name to network address resolution information obtained through the service.\n\nA domain name system (DNS) server is an example of an information system that provides name/address resolution service. Digital signatures and cryptographic keys are examples of additional artifacts. DNS resource records are examples of authoritative data. \n\nNetwork Elements that use technologies other than the DNS to map between host/service names and network addresses provide other means to assure the authenticity and integrity of response data. The DNS security controls are consistent with, and referenced from, OMB Memorandum 08-23.",
1310
+ "severity": "medium"
1311
+ },
1312
+ {
1313
+ "id": "V-27387",
1314
+ "title": "The network element must implement isolation boundary to minimize the number of non-security functions included within the boundary containing security functions.",
1315
+ "description": "The network element isolates security functions from non-security functions by means of an isolation boundary (implemented via partitions and domains) controlling access to and protects the integrity of, the hardware, software, and firmware performing those security functions. The network element maintains a separate execution domain (e.g., address space) for each executing process.",
1316
+ "severity": "medium"
1317
+ },
1318
+ {
1319
+ "id": "V-27389",
1320
+ "title": "The network element must preserve organization-defined system state information in the event of a system failure.",
1321
+ "description": "Failure in a known state can address safety or security in accordance with the mission needs of the organization. Failure in a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system. Preserving system state information facilitates system restart and return to the operational mode of the organization with less disruption of the network.",
1322
+ "severity": "medium"
1323
+ },
1324
+ {
1325
+ "id": "V-27390",
1326
+ "title": "The network element must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.",
1327
+ "description": "The network element isolates security functions from non-security functions by means of an isolation boundary (implemented via partitions and domains) controlling access to and protects the integrity of, the hardware, software, and firmware performing those security functions. The network element maintains a separate execution domain (e.g., address space) for each executing process.",
1328
+ "severity": "medium"
1329
+ },
1330
+ {
1331
+ "id": "V-27391",
1332
+ "title": "The network element must prevent unauthorized and unintended information transfer via shared system resources.",
1333
+ "description": "The purpose of this control is to prevent information produced by the actions of a prior user, role, or the actions of a process acting on behalf of a prior user/role from being available to any current user, role, or current process obtaining access to a shared system resource (e.g., registers, main memory, secondary storage) after the resource has been released back to the network element. Control of information in shared resources is also referred to as object reuse.",
1334
+ "severity": "medium"
1335
+ },
1336
+ {
1337
+ "id": "V-27392",
1338
+ "title": "The network element must employ malicious code protection mechanisms to perform periodic scans of the information system on an organization-defined frequency.",
1339
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Many of these are not detected by anti-virus software or even host intrusion detection systems. Once they have residency within the network, unauthorized users are able to breach firewalls and access sensitive data by assuming the identity of authorized users. Vulnerability assessment scans must be performed on a regular basis to identify devices that are vulnerable or have already been breached by malicious code.",
1340
+ "severity": "medium"
1341
+ },
1342
+ {
1343
+ "id": "V-27393",
1344
+ "title": "The network element must protect against or limits the effects of Denial of Service (DoS) attacks.",
1345
+ "description": "A network element experiencing a DoS attack will not be able to handle production traffic load. The high utilization and CPU caused by a DoS attack will also have an effect on control keep-alives and timers used for neighbor peering resulting in route flapping and eventually black hole production traffic. The device must be configured to thwart, counter, or prevent such attacks.",
1346
+ "severity": "medium"
1347
+ },
1348
+ {
1349
+ "id": "V-27394",
1350
+ "title": "The network element must include components to proactively seek to identify web-based malicious code.",
1351
+ "description": "A honeypot simulates multiple platforms and services used to attract and contain the attackers. \nTo the attacker, it appears to be part of a production network providing services. A honeypot can be one or more hosts deployed within a DMZ or screened sub-net. Honeypots can be used for surveillance, as an early-warning tool, to discover security weaknesses, and to help assess threats. They also will tie up an attacker's resources as they burn time and effort. Honeypots should have no production value, and should not see any legitimate traffic or activity. Whatever they capture is malicious or unauthorized traffic.",
1352
+ "severity": "medium"
1353
+ },
1354
+ {
1355
+ "id": "V-27395",
1356
+ "title": "The network element must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks.",
1357
+ "description": "A network element experiencing a DoS attack will not be able to handle production traffic load. The high utilization and CPU caused by a DoS attack will also have an effect on control keep-alives and timers used for neighbor peering resulting in route flapping and eventually black hole production traffic. The device must be configured to block such attacks.",
1358
+ "severity": "medium"
1359
+ },
1360
+ {
1361
+ "id": "V-27396",
1362
+ "title": "The network element must manage excess bandwidth to limit the effects of packet flooding types of Denial of Service (DoS) attacks.",
1363
+ "description": "A network element experiencing a DoS attack will not be able to handle production traffic load. The high utilization and CPU caused by a DoS attack will also have an effect on control keep-alives and timers used for neighbor peering resulting in route flapping and eventually black hole production traffic. The device must be configured to contain and limit a DoS attack’s effect on the device’s resource utilization.",
1364
+ "severity": "medium"
1365
+ },
1366
+ {
1367
+ "id": "V-27397",
1368
+ "title": "The network element must protect the confidentiality and integrity of system information at rest.",
1369
+ "description": "This control is intended to address the confidentiality and integrity of system information at rest when it is located on a secondary storage device within the network element. It is imperative that system data that is generated as well as device configuration data is protected.",
1370
+ "severity": "medium"
1371
+ },
1372
+ {
1373
+ "id": "V-27398",
1374
+ "title": "The network element must limit and reserve bandwidth based on priority of the traffic type.",
1375
+ "description": "Different applications have unique requirements and toleration levels for delay, jitter, bandwidth, packet loss, and availability. To manage the multitude of applications and services, a network requires a Quality of Service (QoS) framework to differentiate traffic and provide a method to avoid and manage network congestion. When network congestion occurs, all traffic has an equal chance of being dropped. A QoS implementation categorizes network traffic into classes and provides priority treatment based on the classification.",
1376
+ "severity": "medium"
1377
+ },
1378
+ {
1379
+ "id": "V-27399",
1380
+ "title": "The network element must check inbound traffic to ensure that the communications are coming from an authorized source and routed to an authorized destination.",
1381
+ "description": "Spoofing source addresses occurs when a malicious user outside the network has created packets with source address belonging to the private address space of the target network. This is done in an attempt to slip through perimeter as a member host to gain access to internal resources or to conceal identity to perform an attack. It is imperative that all inbound and outbound traffic with spoofed or invalid source addresses are blocked.",
1382
+ "severity": "medium"
1383
+ },
1384
+ {
1385
+ "id": "V-27400",
1386
+ "title": "The network element must provide the means to indicate the security status of child subspaces and (if the child supports secure resolution services) enable verification of a chain of trust among parent and child domains when operating as part of a distributed, hierarchical namespace.",
1387
+ "description": "A recursive resolving or caching domain name system (DNS) server is an example of an information system that provides name/address resolution service for local clients. \n\nAuthoritative DNS servers are examples of authoritative sources. Network elements that use technologies other than the DNS to map between host/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.",
1388
+ "severity": "medium"
1389
+ },
1390
+ {
1391
+ "id": "V-27401",
1392
+ "title": "The network element must employ cryptographic mechanisms to prevent unauthorized disclosure of information at rest unless otherwise protected by alternative physical measures.",
1393
+ "description": "This control is intended to address the confidentiality and integrity of system information at rest when it is located on a secondary storage device within the network element. It is imperative that system data that is generated as well as device configuration data is protected.",
1394
+ "severity": "medium"
1395
+ },
1396
+ {
1397
+ "id": "V-27403",
1398
+ "title": "The network element must implement host-based boundary protection mechanisms.",
1399
+ "description": "Network elements, dependent on the underlying operating system, are at greater risk due to software vulnerabilities and access capabilities. It is critical these devices have host-based intrusion detection system (IDS) and firewalls installed and implemented to provide additional security for the network component.",
1400
+ "severity": "medium"
1401
+ },
1402
+ {
1403
+ "id": "V-27405",
1404
+ "title": "The network element must isolate organization-defined key information security tools, mechanisms, and support components from other internal information system components via physically separate subnets.",
1405
+ "description": "Implementing defense-in-depth by deploying various network security elements at strategic locations and segregating the enclave into separate subnets with unique security policies to provide specific services (public content, remote access, perimeter protection, etc.) is the framework required for securing the enclave.",
1406
+ "severity": "medium"
1407
+ },
1408
+ {
1409
+ "id": "V-27406",
1410
+ "title": "The network element must be configured to perform real-time scans of files from external sources as they are downloaded and prior to being opened or executed.",
1411
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Many of these are not detected by anti-virus software or even host intrusion detection systems. Once they have residency within the network, unauthorized users are able to breach firewalls and access sensitive data by assuming the identity of authorized users. Real-time scans must be performed on files from external sources as they are downloaded and prior to being opened or executed.",
1412
+ "severity": "medium"
1413
+ },
1414
+ {
1415
+ "id": "V-27407",
1416
+ "title": "The network element must receive all management traffic through a dedicated management interface for purposes of access control and auditing.",
1417
+ "description": "From an architectural perspective, implementing out of band (OOB) management for network elements is a best practice and the first step in the deployment of a management network. OOBM networks isolate network users from communication channels dedicated to network management; thereby providing traffic separation that will increase security for all network management activities. The management network should have a direct connection to the managed network elements. Where this is not possible, the OOB management traffic can traverse over a transient IP backbone via private encrypted tunnel. Regardless of transport, all management traffic received by the managed network element must be received by a dedicated management interface connected to the OOBM network.",
1418
+ "severity": "medium"
1419
+ },
1420
+ {
1421
+ "id": "V-27408",
1422
+ "title": "The network element must be configured to perform organization-defined actions in response to malicious code detection.",
1423
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Once they have residency within the network, unauthorized users are able to breach firewalls and access sensitive data by assuming the identity of authorized users. Upon detection of traffic transporting this code, the network element must perform organization-defined actions.",
1424
+ "severity": "medium"
1425
+ },
1426
+ {
1427
+ "id": "V-27409",
1428
+ "title": "The network element must protect the integrity of information during the processes of data aggregation, packaging, and transformation in preparation for transmission.",
1429
+ "description": "Information can be subjected to unauthorized changes (e.g., malicious or unintentional modification) at information aggregation or protocol transformation points.",
1430
+ "severity": "medium"
1431
+ },
1432
+ {
1433
+ "id": "V-27410",
1434
+ "title": "The network element must prevent discovery of specific system components or devices composing a managed interface.",
1435
+ "description": "Allowing neighbor discovery messages to reach external network nodes is dangerous as it provides an attacker a method to obtain information of the network infrastructure that can be useful to plan an attack. In addition, responding to the sending node that a packet cannot be forwarded as the destination host is unreachable provides network mapping information. Furthermore, if a router receives a large number of packets that cannot be forwarded, the router processor could be overloaded if it must generate a high volume of unreachable messages.\nTo mitigate the risk of reconnaissance or a Denial of Service (DoS) attack, all external-facing interfaces must be configured to silently drop unreachable traffic, not announce network address information, and to ignore neighbor solicitation messages.",
1436
+ "severity": "medium"
1437
+ },
1438
+ {
1439
+ "id": "V-27412",
1440
+ "title": "The network element must address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.",
1441
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Once they have residency within the network, unauthorized users are able to breach firewalls and access sensitive data by assuming the identity of authorized users. Upon detection of traffic transporting this code, the network element must perform organization-defined actions and address false positives.",
1442
+ "severity": "medium"
1443
+ },
1444
+ {
1445
+ "id": "V-27413",
1446
+ "title": "The network element must be configured to implement automated mechanisms on an organization-defined frequency to determine the state of information system components with regard to flaw remediation.",
1447
+ "description": "It is imperative that the activity promptly installs security-relevant software updates to mitigate the risk of new vulnerabilities. Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling, are also addressed expeditiously. By requiring that flaw remediation be incorporated into the configuration management process, it is the intent of this control that required/anticipated remediation actions are tracked and verified.",
1448
+ "severity": "medium"
1449
+ },
1450
+ {
1451
+ "id": "V-27414",
1452
+ "title": "The network element must employ automated mechanisms to enforce strict adherence to protocol format.",
1453
+ "description": "Crafted packets not conforming to Institute of Electrical and Electronics Engineers (IEEE) standards can be used by malicious people to exploit a host’s protocol stack to create a Denial of Service (DoS) or force a device reset, bypass security gateway filtering, or compromise a vulnerable device. It is imperative these packets are recognized and discarded at the network perimeter.",
1454
+ "severity": "medium"
1455
+ },
1456
+ {
1457
+ "id": "V-27415",
1458
+ "title": "The network element must automatically update malicious code protection mechanisms and signature definitions.",
1459
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. It can be transported by electronic mail, mail attachments, Web accesses, removable media, or other common means. Malicious mobile code is a vehicle to remotely install malware on a computer. This type of code can be transmitted through interactive Web applications such as ActiveX controls, Flash animation, or JavaScript. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. The black hats and malicious code writers continuously find new methods to attack hosts and the network infrastructure. It is imperative that new protection mechanisms developed to mitigate their risks must be installed as quickly as possible.",
1460
+ "severity": "medium"
1461
+ },
1462
+ {
1463
+ "id": "V-27416",
1464
+ "title": "The network element must prevent access into the organization’s internal networks except as explicitly permitted and controlled by employing boundary protection devices.",
1465
+ "description": "The enclave’s internal network contains the servers where mission critical data and applications reside. There should never be connection attempts made to these devices from any host outside of the enclave. The initial defense for the internal network is to block any traffic at the perimeter attempting to make a connection to a host residing on the internal network.",
1466
+ "severity": "medium"
1467
+ },
1468
+ {
1469
+ "id": "V-27418",
1470
+ "title": "The network element must prevent non-privileged users from circumventing malicious code protection capabilities.",
1471
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. It can be transported by electronic mail, mail attachments, Web accesses, removable media, or other common means. Malicious mobile code is a vehicle to remotely install malware on a computer. This type of code can be transmitted through interactive Web applications such as ActiveX controls, Flash animation, or JavaScript. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. The black hats and malicious code writers continuously find new methods to attack hosts and the network infrastructure. It is critical the protection mechanisms used to detect and contain this code are not tampered with by unauthorized users.",
1472
+ "severity": "medium"
1473
+ },
1474
+ {
1475
+ "id": "V-27419",
1476
+ "title": "The network element must deny network traffic by default and allow network traffic by exception at all interfaces at the network perimeter.",
1477
+ "description": "All inbound and outbound traffic must be denied by default. Firewalls and perimeter routers should only allow traffic through that is explicitly permitted. The initial defense for the internal network is to block any traffic at the perimeter that is attempting to make a connection to a host residing on the internal network. In addition, allowing unknown or undesirable outbound traffic by the firewall or router will establish state that will subsequently permit the return of this undesirable traffic inbound.",
1478
+ "severity": "medium"
1479
+ },
1480
+ {
1481
+ "id": "V-27420",
1482
+ "title": "The network element must be configured to implement automated patch management tools to facilitate flaw remediation to network components.",
1483
+ "description": "It is imperative that the activity promptly installs security-relevant software updates to mitigate the risk of new vulnerabilities. Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling, are also addressed expeditiously. By requiring that flaw remediation be incorporated into the configuration management process, it is the intent of this control that required/anticipated remediation actions are tracked and verified.",
1484
+ "severity": "medium"
1485
+ },
1486
+ {
1487
+ "id": "V-27421",
1488
+ "title": "The network element must route organization-defined internal communications traffic to organization-defined external networks through authenticated proxy servers within the managed interfaces of boundary protection devices.",
1489
+ "description": "A proxy server is designed to hide the identity of the client when making a connection to a server on the outside of its network such as web server, web mail, and chat rooms. This prevents any hackers on the outside of learning IP addresses within the private network. With a proxy acting as the mediator, the client does not interact directly with the servers it is connecting to—the proxy server is in the middle handling both sides of the session. Hence, all routing devices must forward traffic to the appropriate proxy to filter the traffic and initiate the sessions with the external server.",
1490
+ "severity": "medium"
1491
+ },
1492
+ {
1493
+ "id": "V-27422",
1494
+ "title": "The network element must only update malicious code protection mechanisms when directed by a privileged user.",
1495
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. It can be transported by electronic mail, mail attachments, Web accesses, removable media, or other common means. Malicious mobile code is a vehicle to remotely install malware on a computer. This type of code can be transmitted through interactive Web applications such as ActiveX controls, Flash animation, or JavaScript. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. The black hats and malicious code writers continuously find new methods to attack hosts and the network infrastructure. It is critical the protection mechanisms used to detect and contain this code are not tampered with by unauthorized users and are only updated when directed by a privileged user.",
1496
+ "severity": "medium"
1497
+ },
1498
+ {
1499
+ "id": "V-27424",
1500
+ "title": "The network element must employ malicious code protection mechanisms to detect and eradicate malicious code at the network perimeter.",
1501
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Malicious code can be transported by electronic mail, mail attachments, Web accesses, and removable media. Traffic transporting this code must be blocked at the perimeter by firewalls and proxy servers that inspect the applicable traffic types.",
1502
+ "severity": "medium"
1503
+ },
1504
+ {
1505
+ "id": "V-27425",
1506
+ "title": "The network element must deny network traffic and audits internal addresses posing a threat to external information systems.",
1507
+ "description": "The firewall will build a state to allow return traffic for all initiated traffic that was allowed outbound. Monitoring and filtering the outbound traffic adds a layer of protection to the enclave, in addition to being a good Internet citizen by preventing your network from being used as an attack base.",
1508
+ "severity": "medium"
1509
+ },
1510
+ {
1511
+ "id": "V-27426",
1512
+ "title": "The network element must not allow users to introduce removable media into the information system.",
1513
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Malicious code can be transported by electronic mail, mail attachments, Web accesses, and removable media.",
1514
+ "severity": "medium"
1515
+ },
1516
+ {
1517
+ "id": "V-27427",
1518
+ "title": "The network element must monitor and control traffic at both the external and internal boundary interfaces.",
1519
+ "description": "Audit logs are necessary to provide a trail of evidence in case the network is compromised. With this information, the network administrator can devise ways to block the attack and possibly identify and prosecute the attacker. Information supplied by log data is used for forensic analysis in support of incident as well as to aid with normal traffic analysis. It is imperative all inbound and outbound blocked traffic be logged.",
1520
+ "severity": "medium"
1521
+ },
1522
+ {
1523
+ "id": "V-27428",
1524
+ "title": "The network element must connect to external networks only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.",
1525
+ "description": "The firewall will build a state to allow return traffic for all initiated traffic that was allowed outbound. Monitoring and filtering the outbound traffic adds a layer of protection to the enclave, in addition to being a good Internet citizen by preventing your network from being used as an attack base. All network elements must be configured to ensure all traffic is forwarded through the perimeter security infrastructure when sending traffic to external destinations.",
1526
+ "severity": "medium"
1527
+ },
1528
+ {
1529
+ "id": "V-27430",
1530
+ "title": "The network element must perform data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources when requested by client systems.",
1531
+ "description": "A recursive resolving or caching domain name system (DNS) server is an example of an information system that provides name/address resolution service for local clients. \n\nAuthoritative DNS servers are examples of authoritative sources. Network elements that use technologies other than the DNS to map between host/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.",
1532
+ "severity": "medium"
1533
+ },
1534
+ {
1535
+ "id": "V-27431",
1536
+ "title": "The network element must issue public key certificates under an appropriate certificate policy or obtain public key certificates under an appropriate certificate policy from an approved service provider.",
1537
+ "description": "For user certificates, each organization attains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority will suffice. This requirement focuses on certificates with a visibility external to the information system and does not include certificates related to internal system operations, for example, application-specific time services.",
1538
+ "severity": "medium"
1539
+ },
1540
+ {
1541
+ "id": "V-27432",
1542
+ "title": "The network element must protect the integrity of transmitted information.",
1543
+ "description": "If the organization is relying on a commercial service provider for transmission services as a commodity item rather than a fully dedicated service, it may be more difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission integrity. When it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk.",
1544
+ "severity": "medium"
1545
+ },
1546
+ {
1547
+ "id": "V-27433",
1548
+ "title": "The network element must employ cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.",
1549
+ "description": "If the organization is relying on a commercial service provider for transmission services as a commodity item rather than a fully dedicated service for both internal and external connectivity, it may be more difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission integrity. When it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk.",
1550
+ "severity": "medium"
1551
+ },
1552
+ {
1553
+ "id": "V-27435",
1554
+ "title": "The network element must implement detection and inspection mechanisms to identify unauthorized mobile code.",
1555
+ "description": "The mobile code paradigm encompasses programs that can be executed on one or several hosts other than the one they originate from. Mobility of such programs implies some built-in capability for each piece of code to travel smoothly from one host to another. Mobile code systems range from simple applets to intelligent software agents. These systems offer several advantages over the more traditional distributed computing approach. However, mobile code introduces risk to the IT infrastructure. \n\nMalicious mobile code is a vehicle to remotely install malware on a computer. This type of code can be transmitted through interactive Web applications such as ActiveX controls, Flash animation, or JavaScript. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. This code must be detected before it infiltrates the enclave.",
1556
+ "severity": "medium"
1557
+ },
1558
+ {
1559
+ "id": "V-27436",
1560
+ "title": "The network element must maintain the integrity of information during aggregation and encapsulation in preparation for transmission.",
1561
+ "description": "If the organization is relying on a commercial service provider for transmission services as a commodity item rather than a fully dedicated service for both internal and external connectivity, it may be more difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission integrity. When it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk.",
1562
+ "severity": "medium"
1563
+ },
1564
+ {
1565
+ "id": "V-27437",
1566
+ "title": "The network element must protect the confidentiality of transmitted information.",
1567
+ "description": "If the organization is relying on a commercial service provider for transmission services as a commodity item rather than a fully dedicated service for both internal and external connectivity, it may be more difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality. When it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk.",
1568
+ "severity": "medium"
1569
+ },
1570
+ {
1571
+ "id": "V-27438",
1572
+ "title": "The network element must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.",
1573
+ "description": "If the organization is relying on a commercial service provider for transmission services as a commodity item rather than a fully dedicated service for both internal and external connectivity, it may be more difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality. When it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk.",
1574
+ "severity": "medium"
1575
+ },
1576
+ {
1577
+ "id": "V-27440",
1578
+ "title": "The network element must maintain the confidentiality of information during aggregation and encapsulation in preparation for transmission.",
1579
+ "description": "If the organization is relying on a commercial service provider for transmission services as a commodity item rather than a fully dedicated service for both internal and external connectivity, it may be more difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality. When it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk.",
1580
+ "severity": "medium"
1581
+ },
1582
+ {
1583
+ "id": "V-27441",
1584
+ "title": "The network element must perform data origin authentication and data integrity verification on all resolution responses received whether or not local client systems explicitly request this service.",
1585
+ "description": "A recursive resolving or caching domain name system (DNS) server is an example of an information system that provides name/address resolution service for local clients. \n\nAuthoritative DNS servers are examples of authoritative sources that own DNS data. Network elements that use technologies other than the DNS to map between host/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.",
1586
+ "severity": "medium"
1587
+ },
1588
+ {
1589
+ "id": "V-27443",
1590
+ "title": "The network element must terminate the connection associated with a communications session at the end of the session or after an organization-defined time period of inactivity.",
1591
+ "description": "Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled between the managed network element and a PC or terminal server when the later has been left unattended. In addition quickly terminating an idle session will also free up resources committed by the managed network element as well as reduce the risk of a management session from being hijacked.",
1592
+ "severity": "medium"
1593
+ },
1594
+ {
1595
+ "id": "V-27445",
1596
+ "title": "The network element must establish a trusted communications path between the user and organization-defined security functions within the information system.",
1597
+ "description": "To safeguard critical information that could be used by a malicious user to compromise the device or the entire network infrastructure, a trusted path is required for high-confidence connections between the security functions (i.e., login) of the network element and the user.",
1598
+ "severity": "medium"
1599
+ },
1600
+ {
1601
+ "id": "V-27446",
1602
+ "title": "The network element must produce, control, and distribute symmetric cryptographic keys using NIST-approved or NSA-approved key management technology and processes.",
1603
+ "description": "The escalating use of cryptography has brought forth a huge challenge for organizations to protect and manage the hundreds and even thousands of cryptographic keys employed during daily cryptographic transactions. The most secure algorithm is rendered useless if the keys cannot be kept secured. Left unprotected keys are vulnerable to duplication or modification. Duplication enables an attacker to copy a key to be used for access to the service and steal information. An attacker will modify or corrupt a key to cause a Denial of Service. \nThe secure administration and distribution of cryptographic keys is a necessary and critical aspect of risk mitigation. Key management is the process of generating and securely distributing keys used in the encryption process. It is the practice of implementing a security key management policy to protect cryptographic operations from compromise and abuse. The policy must include key generation, distribution, storage, usage, lifetime duration, and destruction.\nCryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. In addition to being required for the effective operation of a cryptographic mechanism, effective cryptographic key management provides protection to maintain the availability of the information in the event of the loss of cryptographic keys by users.\n",
1604
+ "severity": "medium"
1605
+ },
1606
+ {
1607
+ "id": "V-27448",
1608
+ "title": "The network element that collectively provides name/address resolution service for an organization must be fault-tolerant.",
1609
+ "description": "A domain name system (DNS) server is an example of an information system that provides name/address resolution service. To eliminate single points of failure and to enhance redundancy, there are typically at least two authoritative domain name system (DNS) servers, one configured as primary and the other as secondary. Additionally, the two servers are commonly located in two different network subnets and geographically separated (i.e., not located in the same physical facility). \n\nWith regard to role separation, DNS servers with an internal role, only process name/address resolution requests from within the organization (i.e., internal clients). DNS servers with an external role only process name/address resolution information requests from clients external to the organization (i.e., on the external networks including the Internet). The set of clients that can access an authoritative DNS server in a particular role is specified by the organization (e.g., by address ranges, explicit lists). \n\n",
1610
+ "severity": "medium"
1611
+ },
1612
+ {
1613
+ "id": "V-27449",
1614
+ "title": "The network element must take corrective action when unauthorized mobile code is identified.",
1615
+ "description": "The mobile code paradigm encompasses programs that can be executed on one or several hosts other than the one they originate from. Mobility of such programs implies some built-in capability for each piece of code to travel smoothly from one host to another. Mobile code systems range from simple applets to intelligent software agents. These systems offer several advantages over the more traditional distributed computing approach. However, mobile code introduces risk to the IT infrastructure. \n\nMalicious mobile code is a vehicle to remotely install malware on a computer. This type of code can be transmitted through interactive Web applications such as ActiveX controls, Flash animation, or JavaScript. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. This code must be detected before it infiltrates the enclave. When detected, the network element must log and drop the traffic containing the mobile code.",
1616
+ "severity": "medium"
1617
+ },
1618
+ {
1619
+ "id": "V-27450",
1620
+ "title": "The network element must provide mechanisms to protect the authenticity of communications sessions.",
1621
+ "description": "Peering neighbors must have a level of trust with each other since information being shared is used to provide network services, connectivity, and optimized routing. Corrupted or erroneous information shared between network elements can disrupt network operations by creating non-optimized forwarding of traffic and network outages. Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the network element authenticates the source involved in sending the information.",
1622
+ "severity": "medium"
1623
+ },
1624
+ {
1625
+ "id": "V-27451",
1626
+ "title": "The network elements that collectively provide name/address resolution service for an organization must implement internal/external role separation.",
1627
+ "description": "A domain name system (DNS) server is an example of an information system that provides name/address resolution service. To eliminate single points of failure and to enhance redundancy, there are typically at least two authoritative domain name system (DNS) servers, one configured as primary and the other as secondary. \n\nAdditionally, the two servers are commonly located in two different network subnets and geographically separated (i.e., not located in the same physical facility). With regard to role separation, DNS servers with an internal role, only process name/address resolution requests from within the organization (i.e., internal clients). \n\nDNS servers with an external role only process name/address resolution information requests from clients external to the organization (i.e., on the external networks including the Internet). The set of clients that can access an authoritative DNS server in a particular role is specified by the organization (e.g., by address ranges, explicit lists).",
1628
+ "severity": "medium"
1629
+ },
1630
+ {
1631
+ "id": "V-27452",
1632
+ "title": "The information system must provide a readily observable logout capability whenever authentication is used to gain access to web pages.",
1633
+ "description": "Network elements may provide https for administrative access, but not to provide Web pages.",
1634
+ "severity": "medium"
1635
+ },
1636
+ {
1637
+ "id": "V-27454",
1638
+ "title": "The network element must invalidate session identifiers upon user logout or other session termination.",
1639
+ "description": "Peering neighbors must have a level of trust with each other since information being shared is used to provide network services, connectivity, and optimized routing. Corrupted or erroneous information shared between network elements can disrupt network operations by creating non-optimized forwarding of traffic and network outages. Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the network element authenticates the source involved in sending the information. Unique session identifier must also be used to reduce the risk of session hi-jacking.",
1640
+ "severity": "medium"
1641
+ },
1642
+ {
1643
+ "id": "V-27459",
1644
+ "title": "The organization must employ organization-defined information system components with no writeable storage persistent across component restart or power on/off.",
1645
+ "description": "With the exception of auxiliary components hosted on servers, network elements will not have any CD drives.",
1646
+ "severity": "medium"
1647
+ },
1648
+ {
1649
+ "id": "V-27461",
1650
+ "title": "The information system at organization-defined information system components must load and execute the operating environment from hardware-enforced, read-only media.",
1651
+ "description": "With the exception of auxiliary components hosted on servers, network elements will not have any CD drives.",
1652
+ "severity": "medium"
1653
+ },
1654
+ {
1655
+ "id": "V-27462",
1656
+ "title": "The network element must produce, control, and distribute symmetric and asymmetric cryptographic keys using NSA-approved key management technology and processes.",
1657
+ "description": "The escalating use of cryptography has brought forth a huge challenge for organizations to protect and manage the hundreds and even thousands of cryptographic keys employed during daily cryptographic transactions. The most secure algorithm is rendered useless if the keys cannot be kept secured. Left unprotected keys are vulnerable to duplication or modification. Duplication enables an attacker to copy a key to be used for access to the service and steal information. An attacker will modify or corrupt a key to cause a Denial-of-Service. \nThe secure administration and distribution of cryptographic keys is a necessary and critical aspect of risk mitigation. Key management is the process of generating and securely distributing keys used in the encryption process. It is the practice of implementing a security key management policy to protect cryptographic operations from compromise and abuse. The policy must include key generation, distribution, storage, usage, lifetime duration, and destruction.\nCryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. In addition to being required for the effective operation of a cryptographic mechanism, effective cryptographic key management provides protection to maintain the availability of the information in the event of the loss of cryptographic keys by users.",
1658
+ "severity": "medium"
1659
+ },
1660
+ {
1661
+ "id": "V-27463",
1662
+ "title": "The network element must produce, control, and distribute asymmetric cryptographic keys using approved PKI Class 3 certificates or prepositioned keying material.",
1663
+ "description": "The escalating use of cryptography has brought forth a huge challenge for organizations to protect and manage the hundreds and even thousands of cryptographic keys employed during daily cryptographic transactions. The most secure algorithm is rendered useless if the keys cannot be kept secured. Left unprotected keys are vulnerable to duplication or modification. Duplication enables an attacker to copy a key to be used for access to the service and steal information. An attacker will modify or corrupt a key to cause a Denial-of-Service. \nThe secure administration and distribution of cryptographic keys is a necessary and critical aspect of risk mitigation. Key management is the process of generating and securely distributing keys used in the encryption process. It is the practice of implementing a security key management policy to protect cryptographic operations from compromise and abuse. The policy must include key generation, distribution, storage, usage, lifetime duration, and destruction.\nCryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. In addition to being required for the effective operation of a cryptographic mechanism, effective cryptographic key management provides protections to maintain the availability of the information in the event of the loss of cryptographic keys by users.",
1664
+ "severity": "medium"
1665
+ },
1666
+ {
1667
+ "id": "V-27464",
1668
+ "title": "The network element must produce, control, and distribute asymmetric cryptographic keys using approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user’s private key.",
1669
+ "description": "The escalating use of cryptography has brought forth a huge challenge for organizations to protect and manage the hundreds and even thousands of cryptographic keys employed during daily cryptographic transactions. The most secure algorithm is rendered useless if the keys cannot be kept secured. Left unprotected keys are vulnerable to duplication or modification. Duplication enables an attacker to copy a key to be used for access to the service and steal information. An attacker will modify or corrupt a key to cause a Denial-of-Service. \nThe secure administration and distribution of cryptographic keys is a necessary and critical aspect of risk mitigation. Key management is the process of generating and securely distributing keys used in the encryption process. It is the practice of implementing a security key management policy to protect cryptographic operations from compromise and abuse. The policy must include key generation, distribution, storage, usage, lifetime duration, and destruction.\nCryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. In addition to being required for the effective operation of a cryptographic mechanism, effective cryptographic key management provides protections to maintain the availability of the information in the event of the loss of cryptographic keys by users.",
1670
+ "severity": "medium"
1671
+ },
1672
+ {
1673
+ "id": "V-27465",
1674
+ "title": "The network element must employ cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.",
1675
+ "description": "Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. To protect the integrity and confidentiality of non-local maintenance and diagnostics, all packets associated with these sessions must be encrypted. During the authentication process, malicious users can gain knowledge of passwords during authentication process by sniffing local traffic between the network element and the authentication server. It is imperative the authentication process and the transmission of network management traffic implements cryptographic modules adhering to the higher standards approved by the federal government.",
1676
+ "severity": "medium"
1677
+ },
1678
+ {
1679
+ "id": "V-27466",
1680
+ "title": "The information system at organization-defined information system components must load and execute organization-defined applications from hardware-enforced, read-only media.",
1681
+ "description": "With the exception of auxiliary components hosted on servers, network elements will not have any CD drives.",
1682
+ "severity": "medium"
1683
+ },
1684
+ {
1685
+ "id": "V-27467",
1686
+ "title": "The network element must employ FIPS-validated cryptography to protect unclassified information.",
1687
+ "description": "Cryptography is only as strong as the encryption modules/algorithms that are employed to encrypt the data. Use of weak or un-tested encryption algorithms undermines the purposes of utilizing encryption to protect data. Hence it is imperative that transmission of traffic that requires privacy utilize FIPS-validated cryptography.",
1688
+ "severity": "medium"
1689
+ },
1690
+ {
1691
+ "id": "V-27468",
1692
+ "title": "The network element must employ NSA-approved cryptography to protect classified information.",
1693
+ "description": "Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. To protect the integrity and confidentiality of non-local maintenance and diagnostics, all packets associated with these sessions must be encrypted. During the authentication process, malicious users can gain knowledge of passwords during authentication process by sniffing local traffic between the network element and the authentication server. It is imperative the authentication process and the transmission of network management traffic implements NSA-approved cryptography.",
1694
+ "severity": "medium"
1695
+ },
1696
+ {
1697
+ "id": "V-27470",
1698
+ "title": "The network element must employ FIPS-validated cryptography to protect information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.",
1699
+ "description": "Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or un-tested encryption algorithms undermines the purposes of utilizing encryption to protect data. FIPS-validated cryptography must be used to protect information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.",
1700
+ "severity": "medium"
1701
+ },
1702
+ {
1703
+ "id": "V-27472",
1704
+ "title": "The network element must protect the integrity and availability of publicly available information and applications.",
1705
+ "description": "Public-facing servers enable access to information to clients outside of the enclave. These servers are subject to greater exposure to attacks. It is imperative that the integrity of the data is maintained to ensure the enclave does not provide false or erroneous information. The network security element must provide the necessary protection to ensure availability and integrity of the data and to reduce or eliminate Denial-of-Service (DoS) attacks directed against the servers.",
1706
+ "severity": "medium"
1707
+ },
1708
+ {
1709
+ "id": "V-27473",
1710
+ "title": "The network element must associate security attributes with information exchanged between network elements.",
1711
+ "description": "Security attributes are associated with internal structures within the network element used to enable the implementation of access control and flow control policies or support other aspects of the information security policy. It is crucial these attributes are associated and validated to ensure access control and flow control policies are properly implemented.",
1712
+ "severity": "medium"
1713
+ },
1714
+ {
1715
+ "id": "V-27475",
1716
+ "title": "The network element must validate the integrity of security attributes exchanged between network elements.",
1717
+ "description": "Security attributes are associated with internal structures within the network element used to enable the implementation of access control and flow control policies or support other aspects of the information security policy. It is crucial these attributes are associated and validated to ensure access control and flow control policies are properly implemented.",
1718
+ "severity": "medium"
1719
+ },
1720
+ {
1721
+ "id": "V-27476",
1722
+ "title": "The network element must interconnect and configure individual intrusion detection tools into a system-wide intrusion detection system using common protocols.",
1723
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base.",
1724
+ "severity": "medium"
1725
+ },
1726
+ {
1727
+ "id": "V-27477",
1728
+ "title": "The organization must install software updates automatically.",
1729
+ "description": "Network element updates must be planned for during a scheduled network outage.",
1730
+ "severity": "medium"
1731
+ },
1732
+ {
1733
+ "id": "V-27478",
1734
+ "title": "The network element must monitor inbound and outbound communications for unusual or unauthorized activities or conditions.",
1735
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. Monitoring outbound traffic can also detect abnormal traffic or mischievous activities by internal personnel.",
1736
+ "severity": "medium"
1737
+ },
1738
+ {
1739
+ "id": "V-27479",
1740
+ "title": "The network element must provide near real-time alerts when any of the organization-defined list of compromise or potential compromise indicators occur.",
1741
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. When a compromise, potential compromise, or breach has been discovered by the intrusion detection system, it is critical the appropriate personnel are notified via an alert mechanism.",
1742
+ "severity": "medium"
1743
+ },
1744
+ {
1745
+ "id": "V-27480",
1746
+ "title": "The network element must prevent non-privileged users from circumventing intrusion detection and prevention capabilities.",
1747
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. When a compromise or potential compromise or breach has been discovered by the intrusion detection system, it is critical the appropriate personnel are notified via an alert mechanism. The intrusion detection device must be configured to ensure non-privilege users are not able to circumvent the detection or alerting mechanisms.",
1748
+ "severity": "medium"
1749
+ },
1750
+ {
1751
+ "id": "V-27481",
1752
+ "title": "The network element must notify an organization-defined list of incident response personnel of suspicious events.",
1753
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. When a compromise, potential compromise, or breach has been discovered by the intrusion detection system, it is critical the appropriate personnel are notified via an alert mechanism.",
1754
+ "severity": "medium"
1755
+ },
1756
+ {
1757
+ "id": "V-27482",
1758
+ "title": "The network element must take an organization-defined list of least-disruptive actions to terminate suspicious events.",
1759
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. When a compromise, potential compromise, or breach has been discovered by the intrusion detection system, the network element must take action to thwart the attack using methods creating the least disruption to network availability.",
1760
+ "severity": "medium"
1761
+ },
1762
+ {
1763
+ "id": "V-27483",
1764
+ "title": "The network element must protect information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion.",
1765
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. The intrusion detection device must be configured to ensure non-privilege users are not able to circumvent the detection or alerting mechanisms. In addition, all information collected by the intrusion detection systems must be protected from unauthorized access, modification, and deletion.",
1766
+ "severity": "medium"
1767
+ },
1768
+ {
1769
+ "id": "V-27484",
1770
+ "title": "The network element must generate a unique session identifier for each session.",
1771
+ "description": "Peering neighbors must have a level of trust with each other since information being shared is used to provide network services, connectivity, and optimized routing. Corrupted or erroneous information shared between network elements can disrupt network operations by creating non-optimized forwarding of traffic and network outages. Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the network element authenticates the source involved in sending the information. Unique session identifier must also be used to reduce the risk of session hi-jacking.",
1772
+ "severity": "medium"
1773
+ },
1774
+ {
1775
+ "id": "V-27485",
1776
+ "title": "The network element must ensure all encrypted traffic is visible to network monitoring tools.",
1777
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. Regardless of direction, all encrypted traffic must be decrypted prior to reaching the sensor or firewall so all traffic can be monitored.",
1778
+ "severity": "medium"
1779
+ },
1780
+ {
1781
+ "id": "V-27487",
1782
+ "title": "The network element must analyze outbound traffic at the external boundary of the network.",
1783
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. Monitoring outbound traffic can also detect abnormal traffic or mischievous activities by internal personnel.",
1784
+ "severity": "medium"
1785
+ },
1786
+ {
1787
+ "id": "V-27488",
1788
+ "title": "The network element must analyze outbound communications traffic at selected interior points within the network as deemed necessary to discover anomalies.",
1789
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. Monitoring outbound traffic can also detect abnormal traffic or mischievous activities by internal personnel.",
1790
+ "severity": "medium"
1791
+ },
1792
+ {
1793
+ "id": "V-27490",
1794
+ "title": "The organization must employ malicious code protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages transported by electronic mail, electronic mail attachments, Web accesses, removable media, or other common means.",
1795
+ "description": "SI-8 is all for spam protection. Network elements do not receive mail.",
1796
+ "severity": "medium"
1797
+ },
1798
+ {
1799
+ "id": "V-27491",
1800
+ "title": "The network element must detect attack attempts to the wireless network.",
1801
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. \n\nEnclaves are at risk and DoD data could be compromised if wireless scanning is not conducted to identify unauthorized WLAN clients and access points connected to or attempting to connect to the network. An IDS must be deployed capable of monitoring IEEE 802.11 transmissions within all DoD LAN environments and detect nearby unauthorized WLAN devices.\n",
1802
+ "severity": "medium"
1803
+ },
1804
+ {
1805
+ "id": "V-27492",
1806
+ "title": "The network element must detect rogue wireless devices, attack attempts, and potential compromises or breaches to the wireless network.",
1807
+ "description": "Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices should be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. \n\nEnclaves are at risk and DoD data could be compromised if wireless scanning is not conducted to identify unauthorized WLAN clients and access points connected to or attempting to connect to the network. An IDS must be deployed capable of monitoring IEEE 802.11 transmissions within all DoD LAN environments and detect nearby unauthorized WLAN devices.\n",
1808
+ "severity": "medium"
1809
+ },
1810
+ {
1811
+ "id": "V-27493",
1812
+ "title": "The organization must employ malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and take action on unsolicited messages transported by electronic mail, electronic mail attachments, Web accesses, removable media, or other common means.",
1813
+ "description": "SI-8 is all for spam protection. Network elements do not receive mail.",
1814
+ "severity": "medium"
1815
+ },
1816
+ {
1817
+ "id": "V-27495",
1818
+ "title": "The network element must recognize only system-generated session identifiers.",
1819
+ "description": "Peering neighbors must have a level of trust with each other since information being shared is used to provide network services, connectivity, and optimized routing. Corrupted or erroneous information shared between network elements can disrupt network operations by creating non-optimized forwarding of traffic and network outages. Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the network element authenticates the source involved in sending the information. Unique session identifier must also be used to reduce the risk of session hi-jacking.",
1820
+ "severity": "medium"
1821
+ },
1822
+ {
1823
+ "id": "V-27496",
1824
+ "title": "The organization must update spam protection mechanisms (including signature definitions) when new releases are available in accordance with organizational configuration management policy and procedures.",
1825
+ "description": " SI-8 is all for spam protection. Network elements do not receive mail.",
1826
+ "severity": "medium"
1827
+ },
1828
+ {
1829
+ "id": "V-27497",
1830
+ "title": "The network element must generate unique session identifiers with organization-defined randomness requirements.",
1831
+ "description": "Peering neighbors must have a level of trust with each other since information being shared is used to provide network services, connectivity, and optimized routing. Corrupted or erroneous information shared between network elements can disrupt network operations by creating non-optimized forwarding of traffic and network outages. Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the network element authenticates the source involved in sending the information. Unique session identifier must also be used to reduce the risk of session hi-jacking. The greater the randomization of the session identifier, the more difficult to guess or anticipate.",
1832
+ "severity": "medium"
1833
+ },
1834
+ {
1835
+ "id": "V-27498",
1836
+ "title": "The information system must automatically update spam protection mechanisms (including signature definitions).",
1837
+ "description": "SI-8 is all for spam protection. Network elements do not receive mail.",
1838
+ "severity": "medium"
1839
+ },
1840
+ {
1841
+ "id": "V-27499",
1842
+ "title": "The information system must check the validity of information inputs.",
1843
+ "description": "There is no applicability for any network element. This would be directly for an application receiving input for a database. ",
1844
+ "severity": "medium"
1845
+ },
1846
+ {
1847
+ "id": "V-27501",
1848
+ "title": "The network element must verify the correct operation of security functions in accordance with organization-defined conditions and in accordance with organization-defined frequency (if periodic verification).",
1849
+ "description": "The need to verify security functionality is necessary to ensure that the network element’s defense is enabled. For those security functions that are not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. If all security functions are not operating efficiently, the defense of the element and the network is left vulnerable and both could be breached.",
1850
+ "severity": "medium"
1851
+ },
1852
+ {
1853
+ "id": "V-27502",
1854
+ "title": "The information system must reveal error messages only to authorized personnel.",
1855
+ "description": "Any administrator with access to a network element at any privilege level, especially the operator at level 1, will need to see all error conditions.",
1856
+ "severity": "medium"
1857
+ },
1858
+ {
1859
+ "id": "V-27503",
1860
+ "title": "The network element must respond to security function anomalies in accordance with organization-defined responses and alternative actions.",
1861
+ "description": "The need to verify security functionality is necessary to ensure that the network element’s defense is enabled. For those security functions that are not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Upon detection of security function anomalies or failure of automated self-tests, the network element must respond in accordance with organization-defined responses and alternative actions.",
1862
+ "severity": "medium"
1863
+ },
1864
+ {
1865
+ "id": "V-27504",
1866
+ "title": "The network element must provide notification of failed automated security tests.",
1867
+ "description": "Upon detection of a failure of an automated security self-test, the network element must respond in accordance with organization-defined responses and alternative actions. Without taking any self-healing actions or notifying an administrator, the defense of the element and the network is left vulnerable and both could be breached.",
1868
+ "severity": "medium"
1869
+ },
1870
+ {
1871
+ "id": "V-27505",
1872
+ "title": "The network element must provide automated support for the management of distributed security testing.",
1873
+ "description": "The need to verify security functionality is necessary to ensure that the network element’s defense is enabled. To scale the deployment of the verification process, the network element must provide automated support for the management of distributed security testing.",
1874
+ "severity": "medium"
1875
+ },
1876
+ {
1877
+ "id": "V-27506",
1878
+ "title": "The network element must detect unauthorized changes to software and information.",
1879
+ "description": "Anomalous behavior and unauthorized changes must be detected before the network element is breeched or no longer in service. Identifying the source and method used to make the unauthorized change will help to determine what data is at risk and if other systems may be affected.",
1880
+ "severity": "medium"
1881
+ },
1882
+ {
1883
+ "id": "V-27507",
1884
+ "title": "The network element must be configured to identify and respond to potential security-relevant error conditions.",
1885
+ "description": "Error messages generated by various components and services of the network element can indicate a possible security violation or breach. It is imperative the network element is configured to be able to recognize those error messages that can be a symptom of a compromise and to provide notification. The extent to which the network element is able to identify and handle error conditions should be guided by organizational policy, operational requirements, as well as best practices.",
1886
+ "severity": "medium"
1887
+ },
1888
+ {
1889
+ "id": "V-27508",
1890
+ "title": "The network element must generate error messages providing information necessary for corrective actions without revealing organization-defined sensitive or potentially harmful information in error logs and administrative messages that could be exploited.",
1891
+ "description": "The extent to which the network element is able to identify and handle error conditions is guided by organizational policy and operational requirements. However, it is imperative that the network element does not reveal information in log data that could risk the compromise of the device or the network. Hence, the structure and content of error messages needs to be carefully considered by the organization.",
1892
+ "severity": "medium"
1893
+ },
1894
+ {
1895
+ "id": "V-27509",
1896
+ "title": "The network element must activate an organization-defined alarm when a system component failure is detected.",
1897
+ "description": "A network element with a failing security component can potentially put the entire network at risk. If key components to maintaining network security fail to function, it is possible the network element will continue operating in an insecure state. It is imperative this not occur and therefore must immediately send an alarm or shut down.",
1898
+ "severity": "medium"
1899
+ },
1900
+ {
1901
+ "id": "V-27514",
1902
+ "title": "The network element must enforce password complexity by the number of special characters used.",
1903
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organization-defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Combination of upper case, lower case, numbers, and special characters enhances the complexity of the password string.",
1904
+ "severity": "medium"
1905
+ },
1906
+ {
1907
+ "id": "V-30048",
1908
+ "title": "The network element must disable network access by unauthorized devices and logs the information as a security violation.",
1909
+ "description": "Local access to the private network can easily be accomplished by merely connecting a workstation or laptop to any available wall plate or a wireless connection to a nearby access point. Remote access to the network can be accomplished via connection to a VPN gateway. Eliminating unauthorized access to the network is vital to maintaining a secured network.",
1910
+ "severity": "medium"
1911
+ },
1912
+ {
1913
+ "id": "V-30371",
1914
+ "title": "The information system must initiate a session lock after the organization-defined time period of inactivity.",
1915
+ "description": "As you make configuration changes to a router, switch, or firewall, they are applied to the running configuration. There is nothing lost. If the user has not saved the running configuration to non-volatile random-access memory (NVRAM), it can be done by logging back in. Furthermore, a desktop or laptop is used to connect to the router, switch, or firewall. The routers, switches, and firewalls have the idle timeout capability where the session is taken down after a period of inactivity. This is a simple and straightforward solution.",
1916
+ "severity": "medium"
1917
+ },
1918
+ {
1919
+ "id": "V-30420",
1920
+ "title": "The network element must prevent the execution of prohibited mobile code.",
1921
+ "description": "Decisions regarding the employment of mobile code within network elements are based on the potential for the code to cause damage to the system if used maliciously. Mobile code technologies include, for example, Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript.",
1922
+ "severity": "medium"
1923
+ },
1924
+ {
1925
+ "id": "V-30429",
1926
+ "title": "The network element must employ FIPS-validated or NSA-approved cryptography to implement digital signatures.",
1927
+ "description": "Cryptography is only as strong as the encryption algorithms employed to encrypt the data. Use of weak or un-tested encryption algorithms undermines the purposes of utilizing encryption to protect data.",
1928
+ "severity": "medium"
1929
+ },
1930
+ {
1931
+ "id": "V-30474",
1932
+ "title": "The organization must ensure the use of mobile code to be deployed in information systems meets organization-defined mobile code requirements.",
1933
+ "description": "This is an operating system requirement and does not apply to network elements. Mobile code is not deployed in network elements.",
1934
+ "severity": "medium"
1935
+ },
1936
+ {
1937
+ "id": "V-30476",
1938
+ "title": "The organization must ensure the acquisition of mobile code to be deployed in information systems meets organization-defined mobile code requirements.",
1939
+ "description": "This is not applicable. Network elements do not acquire mobile code to be deployed in information systems.",
1940
+ "severity": "medium"
1941
+ },
1942
+ {
1943
+ "id": "V-30479",
1944
+ "title": "The network element must enforce a Discretionary Access Control (DAC) policy that Limits propagation of access rights.",
1945
+ "description": "Access control policies (e.g., identity-based policies, role-based policies, etc.) and access enforcement mechanisms (e.g., access control lists, policy maps, cryptography) are employed by organizations to control access between users (or processes acting on behalf of users) and objects (e.g., devices, data, destination addresses, etc.) within in the network.",
1946
+ "severity": "medium"
1947
+ },
1948
+ {
1949
+ "id": "V-30480",
1950
+ "title": "The network element must enforce a Discretionary Access Control (DAC) policy that includes or excludes access to the granularity of a single user.",
1951
+ "description": "Access control policies (e.g., identity-based policies, role-based policies, etc.) and access enforcement mechanisms (e.g., access control lists, policy maps, cryptography) are employed by organizations to control access between users (or processes acting on behalf of users) and objects (e.g., devices, data, destination addresses, etc.) within in the network.",
1952
+ "severity": "medium"
1953
+ },
1954
+ {
1955
+ "id": "V-30598",
1956
+ "title": "The network element must protect against unauthorized physical connections across the boundary protections implemented at organization-defined list of managed interfaces.",
1957
+ "description": "Local access to the network can easily be accomplished by merely connecting a workstation or laptop to any available wall plate or a wireless connection to a nearby access point. Eliminating unauthorized access to the network is vital to maintaining a secured network.",
1958
+ "severity": "medium"
1959
+ }
1960
+ ]
1961
+ }