kriterion 0.0.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (564) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +2 -0
  3. data/.ruby-version +1 -0
  4. data/.travis.yml +5 -0
  5. data/Dockerfile +18 -0
  6. data/Gemfile +12 -0
  7. data/Gemfile.lock +62 -0
  8. data/LICENSE.txt +21 -0
  9. data/README.md +58 -0
  10. data/Rakefile +6 -0
  11. data/bin/setup +8 -0
  12. data/bin/update_stigs.rb +42 -0
  13. data/criterion.gemspec +31 -0
  14. data/docker-compose.yml +14 -0
  15. data/exe/kriterion +16 -0
  16. data/lib/kriterion.rb +16 -0
  17. data/lib/kriterion/api.rb +27 -0
  18. data/lib/kriterion/backend.rb +13 -0
  19. data/lib/kriterion/backend/mongodb.rb +235 -0
  20. data/lib/kriterion/cli.rb +28 -0
  21. data/lib/kriterion/cli/api.rb +35 -0
  22. data/lib/kriterion/cli/worker.rb +35 -0
  23. data/lib/kriterion/event.rb +36 -0
  24. data/lib/kriterion/item.rb +42 -0
  25. data/lib/kriterion/logs.rb +14 -0
  26. data/lib/kriterion/metrics.rb +22 -0
  27. data/lib/kriterion/object.rb +50 -0
  28. data/lib/kriterion/report.rb +69 -0
  29. data/lib/kriterion/resource.rb +60 -0
  30. data/lib/kriterion/section.rb +32 -0
  31. data/lib/kriterion/standard.rb +65 -0
  32. data/lib/kriterion/version.rb +3 -0
  33. data/lib/kriterion/worker.rb +280 -0
  34. data/standards/cis_red_hat_enterprise_linux_7.json +34 -0
  35. data/standards/stig_a10_networks_adc_alg.json +209 -0
  36. data/standards/stig_a10_networks_adc_ndm.json +233 -0
  37. data/standards/stig_active_directory_domain.json +257 -0
  38. data/standards/stig_active_directory_forest.json +41 -0
  39. data/standards/stig_active_directory_service_2003.json +173 -0
  40. data/standards/stig_active_directory_service_2008.json +167 -0
  41. data/standards/stig_adobe_acrobat_pro_xi.json +167 -0
  42. data/standards/stig_adobe_acrobat_reader_dc_classic_track.json +179 -0
  43. data/standards/stig_adobe_acrobat_reader_dc_continuous_track.json +179 -0
  44. data/standards/stig_adobe_coldfusion_11.json +611 -0
  45. data/standards/stig_airwatch_mdm.json +185 -0
  46. data/standards/stig_aix_5.3.json +3095 -0
  47. data/standards/stig_aix_6.1.json +3047 -0
  48. data/standards/stig_akamai_ksd_service_impact_level_2_alg.json +209 -0
  49. data/standards/stig_akamai_ksd_service_impact_level_2_ndm.json +155 -0
  50. data/standards/stig_android_2.2_dell.json +311 -0
  51. data/standards/stig_apache_2.2_serverwindows.json +347 -0
  52. data/standards/stig_apache_2.2_sitewindows_security_implementation_guide.json +179 -0
  53. data/standards/stig_apache_server_2.0unix.json +341 -0
  54. data/standards/stig_apache_server_2.0windows.json +341 -0
  55. data/standards/stig_apache_server_2.2unix.json +347 -0
  56. data/standards/stig_apache_server_2.2windows.json +347 -0
  57. data/standards/stig_apache_site_2.0unix.json +185 -0
  58. data/standards/stig_apache_site_2.0windows.json +179 -0
  59. data/standards/stig_apache_site_2.2unix.json +185 -0
  60. data/standards/stig_apache_site_2.2windows.json +179 -0
  61. data/standards/stig_apple_ios6.json +341 -0
  62. data/standards/stig_apple_ios_10.json +245 -0
  63. data/standards/stig_apple_ios_11.json +269 -0
  64. data/standards/stig_apple_ios_4_good_mobility_suite_interim_security_configuration_guide_iscg.json +257 -0
  65. data/standards/stig_apple_ios_5.json +329 -0
  66. data/standards/stig_apple_ios_6.json +335 -0
  67. data/standards/stig_apple_ios_6_interim_security_configuration_guide_iscg.json +371 -0
  68. data/standards/stig_apple_ios_7.json +185 -0
  69. data/standards/stig_apple_ios_8_interim_security_configuration_guide.json +251 -0
  70. data/standards/stig_apple_ios_9_interim_security_configuration_guide.json +245 -0
  71. data/standards/stig_apple_os_x_10.10_yosemite_workstation.json +851 -0
  72. data/standards/stig_apple_os_x_10.11.json +725 -0
  73. data/standards/stig_apple_os_x_10.12.json +737 -0
  74. data/standards/stig_apple_os_x_10.8_mountain_lion_workstation.json +1241 -0
  75. data/standards/stig_apple_os_x_10.9_mavericks_workstation.json +809 -0
  76. data/standards/stig_application_layer_gateway_alg_security_requirements_guide_srg.json +911 -0
  77. data/standards/stig_application_layer_gateway_security_requirements_guide.json +911 -0
  78. data/standards/stig_application_security_and_development.json +1745 -0
  79. data/standards/stig_application_security_and_development_checklist.json +959 -0
  80. data/standards/stig_application_security_requirements_guide.json +1961 -0
  81. data/standards/stig_application_server_security_requirements_guide.json +791 -0
  82. data/standards/stig_arcgisserver_10.3.json +143 -0
  83. data/standards/stig_arista_mls_dcs-7000_series_l2s.json +53 -0
  84. data/standards/stig_arista_mls_dcs-7000_series_ndm.json +197 -0
  85. data/standards/stig_arista_mls_dcs-7000_series_rtr.json +143 -0
  86. data/standards/stig_bind_9.x.json +431 -0
  87. data/standards/stig_bind_dns.json +317 -0
  88. data/standards/stig_blackberry_10.2.x_os.json +179 -0
  89. data/standards/stig_blackberry_10_os.json +227 -0
  90. data/standards/stig_blackberry_bes_12.3.x_mdm.json +65 -0
  91. data/standards/stig_blackberry_bes_12.5.x_mdm.json +65 -0
  92. data/standards/stig_blackberry_device_service_6.2.json +425 -0
  93. data/standards/stig_blackberry_enterprise_mobility_server_2.x.json +149 -0
  94. data/standards/stig_blackberry_enterprise_server,_part_1.json +35 -0
  95. data/standards/stig_blackberry_enterprise_server,_part_2.json +155 -0
  96. data/standards/stig_blackberry_enterprise_server,_part_3.json +647 -0
  97. data/standards/stig_blackberry_enterprise_server_version_5.x,_part_1.json +35 -0
  98. data/standards/stig_blackberry_enterprise_server_version_5.x,_part_2.json +155 -0
  99. data/standards/stig_blackberry_enterprise_server_version_5.x,_part_3.json +653 -0
  100. data/standards/stig_blackberry_enterprise_service_v10.1.x_blackberry_device_service.json +317 -0
  101. data/standards/stig_blackberry_enterprise_service_v10.2.x_blackberry_device_service.json +263 -0
  102. data/standards/stig_blackberry_handheld_device.json +125 -0
  103. data/standards/stig_blackberry_os_10.3.x.json +257 -0
  104. data/standards/stig_blackberry_os_7.x.json +107 -0
  105. data/standards/stig_blackberry_os_7.x.x.json +101 -0
  106. data/standards/stig_blackberry_os_version_5-7.json +107 -0
  107. data/standards/stig_blackberry_playbook.json +65 -0
  108. data/standards/stig_blackberry_playbook_os_nea_mode.json +65 -0
  109. data/standards/stig_blackberry_playbook_os_v2.1.json +197 -0
  110. data/standards/stig_blackberry_uem_12.7.json +59 -0
  111. data/standards/stig_bluetoothzigbee.json +35 -0
  112. data/standards/stig_ca_api_gateway_alg.json +497 -0
  113. data/standards/stig_cisco_css_dns.json +71 -0
  114. data/standards/stig_cisco_ios_xe_release_3_ndm.json +395 -0
  115. data/standards/stig_cisco_ios_xe_release_3_rtr.json +149 -0
  116. data/standards/stig_cmd_management_server_policy.json +53 -0
  117. data/standards/stig_commercial_mobile_device_cmd_policy.json +83 -0
  118. data/standards/stig_csfc_campus_wlan_policy_security_implementation_guide.json +95 -0
  119. data/standards/stig_database_security_requirements_guide.json +767 -0
  120. data/standards/stig_dbn-6300_idps.json +107 -0
  121. data/standards/stig_dbn-6300_ndm.json +359 -0
  122. data/standards/stig_defense_switched_network.json +683 -0
  123. data/standards/stig_defense_switched_network_dsn.json +653 -0
  124. data/standards/stig_desktop_applications_general.json +41 -0
  125. data/standards/stig_dns_policy.json +155 -0
  126. data/standards/stig_domain_name_system_dns_security_requirements_guide.json +599 -0
  127. data/standards/stig_draft_aix.json +3503 -0
  128. data/standards/stig_edb_postgres_advanced_server.json +665 -0
  129. data/standards/stig_email_services_policy.json +137 -0
  130. data/standards/stig_exchange_2010_client_access_server.json +179 -0
  131. data/standards/stig_exchange_2010_edge_transport_server.json +389 -0
  132. data/standards/stig_exchange_2010_hub_transport_server.json +269 -0
  133. data/standards/stig_exchange_2010_mailbox_server.json +209 -0
  134. data/standards/stig_f5_big-ip_access_policy_manager_11.x.json +149 -0
  135. data/standards/stig_f5_big-ip_advanced_firewall_manager_11.x.json +41 -0
  136. data/standards/stig_f5_big-ip_application_security_manager_11.x.json +89 -0
  137. data/standards/stig_f5_big-ip_device_management_11.x.json +467 -0
  138. data/standards/stig_f5_big-ip_local_traffic_manager_11.x.json +407 -0
  139. data/standards/stig_final_draft_general_wireless_policy.json +71 -0
  140. data/standards/stig_firewall.json +449 -0
  141. data/standards/stig_firewall_-_cisco.json +449 -0
  142. data/standards/stig_firewall_security_requirements_guide.json +257 -0
  143. data/standards/stig_forescout_counteract_alg.json +83 -0
  144. data/standards/stig_forescout_counteract_ndm.json +239 -0
  145. data/standards/stig_free_space_optics_device.json +143 -0
  146. data/standards/stig_general_mobile_device_policy_non-enterprise_activated.json +113 -0
  147. data/standards/stig_general_mobile_device_technical_non-enterprise_activated.json +59 -0
  148. data/standards/stig_general_purpose_operating_system_srg.json +1199 -0
  149. data/standards/stig_general_wireless_policy.json +71 -0
  150. data/standards/stig_good_mobility_suite_server_android_os.json +203 -0
  151. data/standards/stig_good_mobility_suite_server_apple_ios_4_interim_security_configuration_guide_iscg.json +209 -0
  152. data/standards/stig_good_mobility_suite_server_windows_phone_6.5.json +449 -0
  153. data/standards/stig_goodenterprise_8.x.json +401 -0
  154. data/standards/stig_google_chrome_browser.json +209 -0
  155. data/standards/stig_google_chrome_current_windows.json +215 -0
  156. data/standards/stig_google_chrome_draft.json +281 -0
  157. data/standards/stig_google_chrome_v23_windows.json +275 -0
  158. data/standards/stig_google_chrome_v24_windows.json +263 -0
  159. data/standards/stig_google_chrome_v24_windows_benchmark.json +227 -0
  160. data/standards/stig_google_search_appliance.json +209 -0
  161. data/standards/stig_harris_secnet_11_54.json +89 -0
  162. data/standards/stig_hp-ux_11.23.json +3215 -0
  163. data/standards/stig_hp-ux_11.31.json +3155 -0
  164. data/standards/stig_hp-ux_smse.json +431 -0
  165. data/standards/stig_hpe_3par_storeserv_3.2.x.json +131 -0
  166. data/standards/stig_ibm_datapower_alg.json +401 -0
  167. data/standards/stig_ibm_datapower_network_device_management.json +395 -0
  168. data/standards/stig_ibm_db2_v10.5_luw.json +575 -0
  169. data/standards/stig_ibm_hardware_management_console_hmc.json +221 -0
  170. data/standards/stig_ibm_hardware_management_console_hmc_policies.json +35 -0
  171. data/standards/stig_ibm_maas360_v2.3.x_mdm.json +59 -0
  172. data/standards/stig_ibm_zvm_using_ca_vm:secure.json +473 -0
  173. data/standards/stig_idps_security_requirements_guide_srg.json +1865 -0
  174. data/standards/stig_idsips.json +257 -0
  175. data/standards/stig_iis6_server.json +221 -0
  176. data/standards/stig_iis6_site.json +263 -0
  177. data/standards/stig_iis_7.0_web_server.json +155 -0
  178. data/standards/stig_iis_7.0_web_site.json +299 -0
  179. data/standards/stig_iis_8.5_server.json +293 -0
  180. data/standards/stig_iis_8.5_site.json +347 -0
  181. data/standards/stig_infoblox_7.x_dns.json +419 -0
  182. data/standards/stig_infrastructure_l3_switch.json +599 -0
  183. data/standards/stig_infrastructure_l3_switch_-_cisco.json +659 -0
  184. data/standards/stig_infrastructure_l3_switch_secure_technical_implementation_guide_-_cisco.json +659 -0
  185. data/standards/stig_infrastructure_router.json +479 -0
  186. data/standards/stig_infrastructure_router_-_cisco.json +539 -0
  187. data/standards/stig_infrastructure_router_-_juniper.json +485 -0
  188. data/standards/stig_infrastructure_router__cisco.json +539 -0
  189. data/standards/stig_infrastructure_router__juniper.json +485 -0
  190. data/standards/stig_internet_explorer_8.json +821 -0
  191. data/standards/stig_internet_explorer_9.json +815 -0
  192. data/standards/stig_intrusion_detection_and_prevention_systems_idps_security_requirements_guide.json +371 -0
  193. data/standards/stig_ipsec_vpn_gateway.json +521 -0
  194. data/standards/stig_java_runtime_environment_jre_6_unix.json +65 -0
  195. data/standards/stig_java_runtime_environment_jre_6_win7.json +65 -0
  196. data/standards/stig_java_runtime_environment_jre_6_windows_xp.json +77 -0
  197. data/standards/stig_java_runtime_environment_jre_6_winxp.json +65 -0
  198. data/standards/stig_java_runtime_environment_jre_7_unix.json +65 -0
  199. data/standards/stig_java_runtime_environment_jre_7_win7.json +65 -0
  200. data/standards/stig_java_runtime_environment_jre_7_winxp.json +65 -0
  201. data/standards/stig_java_runtime_environment_jre_version_6_unix.json +77 -0
  202. data/standards/stig_java_runtime_environment_jre_version_6_windows_7.json +77 -0
  203. data/standards/stig_java_runtime_environment_jre_version_6_windows_xp.json +65 -0
  204. data/standards/stig_java_runtime_environment_jre_version_7_unix.json +77 -0
  205. data/standards/stig_java_runtime_environment_jre_version_7_windows_7.json +77 -0
  206. data/standards/stig_java_runtime_environment_jre_version_7_winxp.json +77 -0
  207. data/standards/stig_java_runtime_environment_jre_version_8_unix.json +107 -0
  208. data/standards/stig_java_runtime_environment_jre_version_8_windows.json +107 -0
  209. data/standards/stig_jboss_eap_6.3.json +413 -0
  210. data/standards/stig_juniper_srx_sg_alg.json +155 -0
  211. data/standards/stig_juniper_srx_sg_idps.json +179 -0
  212. data/standards/stig_juniper_srx_sg_ndm.json +443 -0
  213. data/standards/stig_juniper_srx_sg_vpn.json +185 -0
  214. data/standards/stig_keyboard_video_and_mouse_switch.json +269 -0
  215. data/standards/stig_l3_kov-26_talon_wireless_role.json +77 -0
  216. data/standards/stig_layer_2_switch.json +347 -0
  217. data/standards/stig_layer_2_switch_-_cisco.json +365 -0
  218. data/standards/stig_lg_android_5.x_interim_security_configuration_guide.json +245 -0
  219. data/standards/stig_lg_android_6.x.json +281 -0
  220. data/standards/stig_mac_osx_10.6_workstation.json +1319 -0
  221. data/standards/stig_mac_osx_10.6_workstation_draft.json +1319 -0
  222. data/standards/stig_mainframe_product_security_requirements_guide.json +1115 -0
  223. data/standards/stig_mcafee_application_control_7.x.json +203 -0
  224. data/standards/stig_mcafee_move_2.63.6.1_multi-platform_client.json +149 -0
  225. data/standards/stig_mcafee_move_2.63.6.1_multi-platform_oss.json +101 -0
  226. data/standards/stig_mcafee_move_2.6_multi-platform_client.json +149 -0
  227. data/standards/stig_mcafee_move_2.6_multi-platform_oss.json +101 -0
  228. data/standards/stig_mcafee_move_3.6.1_multi-platform_client.json +149 -0
  229. data/standards/stig_mcafee_move_3.6.1_multi-platform_oss.json +101 -0
  230. data/standards/stig_mcafee_move_agentless_3.03.6.1_security_virtual_appliance.json +167 -0
  231. data/standards/stig_mcafee_move_agentless_3.0_security_virtual_appliance.json +167 -0
  232. data/standards/stig_mcafee_move_agentless_3.0_vsel_1.9sva.json +203 -0
  233. data/standards/stig_mcafee_move_agentless_3.6.1_security_virtual_appliance.json +167 -0
  234. data/standards/stig_mcafee_move_av_agentless_4.5.json +155 -0
  235. data/standards/stig_mcafee_move_av_multi-platform_4.5.json +215 -0
  236. data/standards/stig_mcafee_virusscan_8.8_local_client.json +533 -0
  237. data/standards/stig_mcafee_virusscan_8.8_managed_client.json +533 -0
  238. data/standards/stig_mcafee_vsel_1.92.0_local_client.json +245 -0
  239. data/standards/stig_mcafee_vsel_1.92.0_managed_client.json +239 -0
  240. data/standards/stig_mdm_server_policy.json +47 -0
  241. data/standards/stig_microsoft_access_2003.json +47 -0
  242. data/standards/stig_microsoft_access_2007.json +77 -0
  243. data/standards/stig_microsoft_access_2010.json +119 -0
  244. data/standards/stig_microsoft_access_2013.json +113 -0
  245. data/standards/stig_microsoft_access_2016.json +107 -0
  246. data/standards/stig_microsoft_dot_net_framework_4.0.json +101 -0
  247. data/standards/stig_microsoft_excel_2003.json +47 -0
  248. data/standards/stig_microsoft_excel_2007.json +155 -0
  249. data/standards/stig_microsoft_excel_2010.json +287 -0
  250. data/standards/stig_microsoft_excel_2013.json +293 -0
  251. data/standards/stig_microsoft_excel_2016.json +257 -0
  252. data/standards/stig_microsoft_exchange_2010_client_access_server_role.json +71 -0
  253. data/standards/stig_microsoft_exchange_2010_core_server.json +47 -0
  254. data/standards/stig_microsoft_exchange_2010_edge_transport_server_role.json +233 -0
  255. data/standards/stig_microsoft_exchange_2010_hub_transport_server_role.json +125 -0
  256. data/standards/stig_microsoft_exchange_2010_mailbox_server_role.json +107 -0
  257. data/standards/stig_microsoft_exchange_server_2003.json +647 -0
  258. data/standards/stig_microsoft_groove_2013.json +71 -0
  259. data/standards/stig_microsoft_ie_version_6.json +599 -0
  260. data/standards/stig_microsoft_ie_version_7.json +749 -0
  261. data/standards/stig_microsoft_infopath_2003.json +41 -0
  262. data/standards/stig_microsoft_infopath_2007.json +167 -0
  263. data/standards/stig_microsoft_infopath_2010.json +155 -0
  264. data/standards/stig_microsoft_infopath_2013.json +149 -0
  265. data/standards/stig_microsoft_internet_explorer_10.json +857 -0
  266. data/standards/stig_microsoft_internet_explorer_11.json +839 -0
  267. data/standards/stig_microsoft_internet_explorer_9.json +821 -0
  268. data/standards/stig_microsoft_lync_2013.json +29 -0
  269. data/standards/stig_microsoft_office_system_2007.json +221 -0
  270. data/standards/stig_microsoft_office_system_2010.json +233 -0
  271. data/standards/stig_microsoft_office_system_2013.json +293 -0
  272. data/standards/stig_microsoft_office_system_2016.json +131 -0
  273. data/standards/stig_microsoft_onedrivebusiness_2016.json +89 -0
  274. data/standards/stig_microsoft_onenote_2010.json +77 -0
  275. data/standards/stig_microsoft_onenote_2013.json +71 -0
  276. data/standards/stig_microsoft_onenote_2016.json +71 -0
  277. data/standards/stig_microsoft_outlook_2003.json +65 -0
  278. data/standards/stig_microsoft_outlook_2007.json +479 -0
  279. data/standards/stig_microsoft_outlook_2010.json +515 -0
  280. data/standards/stig_microsoft_outlook_2013.json +497 -0
  281. data/standards/stig_microsoft_outlook_2016.json +359 -0
  282. data/standards/stig_microsoft_powerpoint_2003.json +47 -0
  283. data/standards/stig_microsoft_powerpoint_2007.json +131 -0
  284. data/standards/stig_microsoft_powerpoint_2010.json +191 -0
  285. data/standards/stig_microsoft_powerpoint_2013.json +251 -0
  286. data/standards/stig_microsoft_powerpoint_2016.json +233 -0
  287. data/standards/stig_microsoft_project_2010.json +83 -0
  288. data/standards/stig_microsoft_project_2013.json +95 -0
  289. data/standards/stig_microsoft_project_2016.json +95 -0
  290. data/standards/stig_microsoft_publisher_2010.json +107 -0
  291. data/standards/stig_microsoft_publisher_2013.json +101 -0
  292. data/standards/stig_microsoft_publisher_2016.json +101 -0
  293. data/standards/stig_microsoft_sharepoint_designer_2013.json +71 -0
  294. data/standards/stig_microsoft_skypebusiness_2016.json +29 -0
  295. data/standards/stig_microsoft_sql_server_2005_database.json +167 -0
  296. data/standards/stig_microsoft_sql_server_2005_instance.json +1001 -0
  297. data/standards/stig_microsoft_sql_server_2012_database.json +179 -0
  298. data/standards/stig_microsoft_sql_server_2012_database_instance.json +929 -0
  299. data/standards/stig_microsoft_visio_2013.json +89 -0
  300. data/standards/stig_microsoft_visio_2016.json +89 -0
  301. data/standards/stig_microsoft_windows_10_mobile.json +215 -0
  302. data/standards/stig_microsoft_windows_2008_server_domain_name_system.json +269 -0
  303. data/standards/stig_microsoft_windows_2012_server_domain_name_system.json +551 -0
  304. data/standards/stig_microsoft_windows_phone_8.1.json +161 -0
  305. data/standards/stig_microsoft_windows_server_2012_domain_controller.json +2633 -0
  306. data/standards/stig_microsoft_windows_server_2012_member_server.json +2411 -0
  307. data/standards/stig_microsoft_word_2003.json +47 -0
  308. data/standards/stig_microsoft_word_2007.json +119 -0
  309. data/standards/stig_microsoft_word_2010.json +221 -0
  310. data/standards/stig_microsoft_word_2013.json +221 -0
  311. data/standards/stig_microsoft_word_2016.json +215 -0
  312. data/standards/stig_mobile_application_management_mam_server.json +95 -0
  313. data/standards/stig_mobile_application_security_requirements_guide.json +233 -0
  314. data/standards/stig_mobile_device_integrity_scanning_mdis_server.json +119 -0
  315. data/standards/stig_mobile_device_management_mdm_server.json +125 -0
  316. data/standards/stig_mobile_device_manager_security_requirements_guide.json +2555 -0
  317. data/standards/stig_mobile_email_management_mem_server.json +197 -0
  318. data/standards/stig_mobile_operating_system_security_requirements_guide.json +1943 -0
  319. data/standards/stig_mobile_policy.json +35 -0
  320. data/standards/stig_mobile_policy_security_requirements_guide.json +437 -0
  321. data/standards/stig_mobileiron_core_v9.x_mdm.json +89 -0
  322. data/standards/stig_mobility_policy.json +65 -0
  323. data/standards/stig_mozilla_firefox.json +161 -0
  324. data/standards/stig_ms_exchange_2013_client_access_server.json +209 -0
  325. data/standards/stig_ms_exchange_2013_edge_transport_server.json +443 -0
  326. data/standards/stig_ms_exchange_2013_mailbox_server.json +437 -0
  327. data/standards/stig_ms_sharepoint_2010.json +269 -0
  328. data/standards/stig_ms_sharepoint_2013.json +245 -0
  329. data/standards/stig_ms_sharepoint_designer_2013.json +71 -0
  330. data/standards/stig_ms_sql_server_2014_database.json +263 -0
  331. data/standards/stig_ms_sql_server_2014_instance.json +575 -0
  332. data/standards/stig_ms_sql_server_2016_database.json +185 -0
  333. data/standards/stig_ms_sql_server_2016_instance.json +731 -0
  334. data/standards/stig_ms_windows_defender_antivirus.json +257 -0
  335. data/standards/stig_multifunction_device_and_network_printers.json +131 -0
  336. data/standards/stig_network_device_management_security_requirements_guide.json +863 -0
  337. data/standards/stig_network_devices.json +389 -0
  338. data/standards/stig_network_infrastructure_policy.json +455 -0
  339. data/standards/stig_network_security_requirements_guide.json +1961 -0
  340. data/standards/stig_operating_system_security_requirements_guide.json +1961 -0
  341. data/standards/stig_oracle_10_database_installation.json +527 -0
  342. data/standards/stig_oracle_10_database_instance.json +569 -0
  343. data/standards/stig_oracle_11_database_installation.json +527 -0
  344. data/standards/stig_oracle_11_database_instance.json +551 -0
  345. data/standards/stig_oracle_database_10g_installation.json +527 -0
  346. data/standards/stig_oracle_database_10g_instance.json +581 -0
  347. data/standards/stig_oracle_database_11.2g.json +1229 -0
  348. data/standards/stig_oracle_database_11g_installation.json +527 -0
  349. data/standards/stig_oracle_database_11g_instance.json +575 -0
  350. data/standards/stig_oracle_database_12c.json +1217 -0
  351. data/standards/stig_oracle_http_server_12.1.3.json +1703 -0
  352. data/standards/stig_oracle_linux_5.json +3431 -0
  353. data/standards/stig_oracle_linux_6.json +1583 -0
  354. data/standards/stig_oracle_weblogic_server_12c.json +443 -0
  355. data/standards/stig_palo_alto_networks_alg.json +311 -0
  356. data/standards/stig_palo_alto_networks_idps.json +185 -0
  357. data/standards/stig_palo_alto_networks_ndm.json +251 -0
  358. data/standards/stig_pda.json +83 -0
  359. data/standards/stig_pdasmartphone.json +95 -0
  360. data/standards/stig_perimeter_l3_switch.json +923 -0
  361. data/standards/stig_perimeter_l3_switch_-_cisco.json +1001 -0
  362. data/standards/stig_perimeter_router.json +803 -0
  363. data/standards/stig_perimeter_router_cisco.json +881 -0
  364. data/standards/stig_perimeter_router_juniper.json +803 -0
  365. data/standards/stig_postgresql_9.x.json +677 -0
  366. data/standards/stig_red_hat_enterprise_linux_5.json +3437 -0
  367. data/standards/stig_red_hat_enterprise_linux_6.json +1565 -0
  368. data/standards/stig_red_hat_enterprise_linux_7.json +1451 -0
  369. data/standards/stig_remote_access_policy.json +317 -0
  370. data/standards/stig_removable_storage_and_external_connection_technologies.json +143 -0
  371. data/standards/stig_removable_storage_and_external_connections.json +137 -0
  372. data/standards/stig_rfid_scanner.json +35 -0
  373. data/standards/stig_rfid_workstation.json +23 -0
  374. data/standards/stig_riverbed_steelhead_cx_v8_alg.json +83 -0
  375. data/standards/stig_riverbed_steelhead_cx_v8_ndm.json +371 -0
  376. data/standards/stig_router_security_requirements_guide.json +575 -0
  377. data/standards/stig_samsung_android_os_5_with_knox_2.0.json +365 -0
  378. data/standards/stig_samsung_android_os_6_with_knox_2.x.json +377 -0
  379. data/standards/stig_samsung_android_os_7_with_knox_2.x.json +443 -0
  380. data/standards/stig_samsung_android_with_knox_1.x.json +293 -0
  381. data/standards/stig_samsung_android_with_knox_2.x.json +371 -0
  382. data/standards/stig_samsung_knox_android_1.0.json +167 -0
  383. data/standards/stig_sharepoint_2010.json +269 -0
  384. data/standards/stig_sharepoint_2013.json +245 -0
  385. data/standards/stig_smartphone_policy.json +131 -0
  386. data/standards/stig_solaris_10_sparc.json +3029 -0
  387. data/standards/stig_solaris_10_x86.json +3065 -0
  388. data/standards/stig_solaris_11_sparc.json +1427 -0
  389. data/standards/stig_solaris_11_x86.json +1421 -0
  390. data/standards/stig_solaris_9_sparc.json +2915 -0
  391. data/standards/stig_solaris_9_x86.json +2915 -0
  392. data/standards/stig_sun_ray_4.json +185 -0
  393. data/standards/stig_sun_ray_4_policy.json +77 -0
  394. data/standards/stig_suse_linux_enterprise_server_v11system_z.json +3311 -0
  395. data/standards/stig_symantec_endpoint_protection_12.1_local_client_antivirus.json +689 -0
  396. data/standards/stig_symantec_endpoint_protection_12.1_managed_client_antivirus.json +695 -0
  397. data/standards/stig_tanium_6.5.json +461 -0
  398. data/standards/stig_tanium_7.0.json +803 -0
  399. data/standards/stig_test_and_development_zone_a.json +167 -0
  400. data/standards/stig_test_and_development_zone_b.json +179 -0
  401. data/standards/stig_test_and_development_zone_c.json +143 -0
  402. data/standards/stig_test_and_development_zone_d.json +143 -0
  403. data/standards/stig_traditional_security.json +917 -0
  404. data/standards/stig_unix_srg.json +3287 -0
  405. data/standards/stig_video_services_policy.json +497 -0
  406. data/standards/stig_video_teleconference.json +47 -0
  407. data/standards/stig_video_teleconference_vtc.json +12 -0
  408. data/standards/stig_vmware_esx_3_policy.json +155 -0
  409. data/standards/stig_vmware_esx_3_server.json +3791 -0
  410. data/standards/stig_vmware_esx_3_virtual_center.json +257 -0
  411. data/standards/stig_vmware_esx_3_virtual_machine.json +53 -0
  412. data/standards/stig_vmware_esxi_server_5.0.json +809 -0
  413. data/standards/stig_vmware_esxi_v5.json +5177 -0
  414. data/standards/stig_vmware_esxi_version_5_virtual_machine.json +317 -0
  415. data/standards/stig_vmware_nsx_distributed_firewall.json +83 -0
  416. data/standards/stig_vmware_nsx_distributed_logical_router.json +35 -0
  417. data/standards/stig_vmware_nsx_manager.json +191 -0
  418. data/standards/stig_vmware_vcenter_server.json +179 -0
  419. data/standards/stig_vmware_vcenter_server_version_5.json +149 -0
  420. data/standards/stig_vmware_vsphere_esxi_6.0.json +659 -0
  421. data/standards/stig_vmware_vsphere_vcenter_server_version_6.json +311 -0
  422. data/standards/stig_vmware_vsphere_virtual_machine_version_6.json +269 -0
  423. data/standards/stig_voice_and_video_over_internet_protocol_vvoip_policy.json +407 -0
  424. data/standards/stig_voice_video_endpoint_security_requirements_guide.json +395 -0
  425. data/standards/stig_voice_video_services_policy.json +671 -0
  426. data/standards/stig_voice_video_session_management_security_requirements_guide.json +329 -0
  427. data/standards/stig_voicevideo_over_internet_protocol.json +419 -0
  428. data/standards/stig_voicevideo_over_internet_protocol_vvoip.json +263 -0
  429. data/standards/stig_voicevideo_services_policy.json +569 -0
  430. data/standards/stig_web_policy.json +95 -0
  431. data/standards/stig_web_server.json +317 -0
  432. data/standards/stig_web_server_security_requirements_guide.json +587 -0
  433. data/standards/stig_win2k3_audit.json +761 -0
  434. data/standards/stig_win2k8_audit.json +1085 -0
  435. data/standards/stig_win2k8_r2_audit.json +1637 -0
  436. data/standards/stig_win7_audit.json +1613 -0
  437. data/standards/stig_windows_10.json +1691 -0
  438. data/standards/stig_windows_2003_domain_controller.json +893 -0
  439. data/standards/stig_windows_2003_member_server.json +845 -0
  440. data/standards/stig_windows_2008_domain_controller.json +1475 -0
  441. data/standards/stig_windows_2008_member_server.json +1301 -0
  442. data/standards/stig_windows_7.json +1781 -0
  443. data/standards/stig_windows_8.json +2399 -0
  444. data/standards/stig_windows_88.1.json +2273 -0
  445. data/standards/stig_windows_8_8.1.json +2297 -0
  446. data/standards/stig_windows_defender_antivirus.json +239 -0
  447. data/standards/stig_windows_dns.json +185 -0
  448. data/standards/stig_windows_firewall_with_advanced_security.json +137 -0
  449. data/standards/stig_windows_paw.json +155 -0
  450. data/standards/stig_windows_phone_6.5_with_good_mobility_suite.json +65 -0
  451. data/standards/stig_windows_server_2008_r2_domain_controller.json +1961 -0
  452. data/standards/stig_windows_server_2008_r2_member_server.json +1745 -0
  453. data/standards/stig_windows_server_20122012_r2_domain_controller.json +2255 -0
  454. data/standards/stig_windows_server_20122012_r2_member_server.json +2045 -0
  455. data/standards/stig_windows_server_2012_2012_r2_domain_controller.json +2279 -0
  456. data/standards/stig_windows_server_2012_2012_r2_member_server.json +2075 -0
  457. data/standards/stig_windows_server_2012_domain_controller.json +2471 -0
  458. data/standards/stig_windows_server_2012_member_server.json +2249 -0
  459. data/standards/stig_windows_server_2016.json +1661 -0
  460. data/standards/stig_windows_vista.json +1517 -0
  461. data/standards/stig_windows_xp.json +893 -0
  462. data/standards/stig_wireless_keyboard_and_mouse.json +23 -0
  463. data/standards/stig_wireless_management_server_policy.json +53 -0
  464. data/standards/stig_wireless_remote_access_policy_security_implementation_guide.json +29 -0
  465. data/standards/stig_wlan_access_point_enclave-niprnet_connected.json +227 -0
  466. data/standards/stig_wlan_access_point_internet_gateway_only_connection.json +209 -0
  467. data/standards/stig_wlan_access_point_policy.json +17 -0
  468. data/standards/stig_wlan_authentication_server.json +29 -0
  469. data/standards/stig_wlan_bridge.json +209 -0
  470. data/standards/stig_wlan_client.json +65 -0
  471. data/standards/stig_wlan_controller.json +215 -0
  472. data/standards/stig_wlan_ids_sensorserver.json +23 -0
  473. data/standards/stig_wman_access_point.json +263 -0
  474. data/standards/stig_wman_bridge.json +209 -0
  475. data/standards/stig_wman_subscriber.json +65 -0
  476. data/standards/stig_zos_acf2.json +1451 -0
  477. data/standards/stig_zos_bmc_control-dacf2.json +53 -0
  478. data/standards/stig_zos_bmc_control-dracf.json +59 -0
  479. data/standards/stig_zos_bmc_control-dtss.json +65 -0
  480. data/standards/stig_zos_bmc_control-macf2.json +59 -0
  481. data/standards/stig_zos_bmc_control-mracf.json +65 -0
  482. data/standards/stig_zos_bmc_control-mrestartacf2.json +23 -0
  483. data/standards/stig_zos_bmc_control-mrestartracf.json +23 -0
  484. data/standards/stig_zos_bmc_control-mrestarttss.json +23 -0
  485. data/standards/stig_zos_bmc_control-mtss.json +71 -0
  486. data/standards/stig_zos_bmc_control-oacf2.json +53 -0
  487. data/standards/stig_zos_bmc_control-oracf.json +59 -0
  488. data/standards/stig_zos_bmc_control-otss.json +65 -0
  489. data/standards/stig_zos_bmc_ioaacf2.json +53 -0
  490. data/standards/stig_zos_bmc_ioaracf.json +59 -0
  491. data/standards/stig_zos_bmc_ioatss.json +65 -0
  492. data/standards/stig_zos_bmc_mainviewzosacf2.json +47 -0
  493. data/standards/stig_zos_bmc_mainviewzosracf.json +53 -0
  494. data/standards/stig_zos_bmc_mainviewzostss.json +59 -0
  495. data/standards/stig_zos_ca_1_tape_managementacf2.json +65 -0
  496. data/standards/stig_zos_ca_1_tape_managementracf.json +77 -0
  497. data/standards/stig_zos_ca_1_tape_managementtss.json +77 -0
  498. data/standards/stig_zos_ca_auditoracf2.json +29 -0
  499. data/standards/stig_zos_ca_auditorracf.json +29 -0
  500. data/standards/stig_zos_ca_auditortss.json +29 -0
  501. data/standards/stig_zos_ca_common_servicesacf2.json +23 -0
  502. data/standards/stig_zos_ca_common_servicesracf.json +29 -0
  503. data/standards/stig_zos_ca_common_servicestss.json +29 -0
  504. data/standards/stig_zos_ca_micsacf2.json +23 -0
  505. data/standards/stig_zos_ca_micsracf.json +23 -0
  506. data/standards/stig_zos_ca_micstss.json +23 -0
  507. data/standards/stig_zos_ca_mimacf2.json +41 -0
  508. data/standards/stig_zos_ca_mimracf.json +47 -0
  509. data/standards/stig_zos_ca_mimtss.json +47 -0
  510. data/standards/stig_zos_ca_vtapeacf2.json +29 -0
  511. data/standards/stig_zos_ca_vtaperacf.json +35 -0
  512. data/standards/stig_zos_ca_vtapetss.json +35 -0
  513. data/standards/stig_zos_catalog_solutionsacf2.json +23 -0
  514. data/standards/stig_zos_catalog_solutionsracf.json +23 -0
  515. data/standards/stig_zos_catalog_solutionstss.json +23 -0
  516. data/standards/stig_zos_clsupersessionacf2.json +53 -0
  517. data/standards/stig_zos_clsupersessionracf.json +65 -0
  518. data/standards/stig_zos_clsupersessiontss.json +71 -0
  519. data/standards/stig_zos_compuware_abend-aidacf2.json +47 -0
  520. data/standards/stig_zos_compuware_abend-aidracf.json +53 -0
  521. data/standards/stig_zos_compuware_abend-aidtss.json +53 -0
  522. data/standards/stig_zos_cssmtpacf2.json +23 -0
  523. data/standards/stig_zos_cssmtpracf.json +29 -0
  524. data/standards/stig_zos_cssmtptss.json +29 -0
  525. data/standards/stig_zos_fdracf2.json +23 -0
  526. data/standards/stig_zos_fdrracf.json +23 -0
  527. data/standards/stig_zos_fdrtss.json +23 -0
  528. data/standards/stig_zos_hcdacf2.json +29 -0
  529. data/standards/stig_zos_hcdracf.json +29 -0
  530. data/standards/stig_zos_hcdtss.json +29 -0
  531. data/standards/stig_zos_ibm_cics_transaction_serveracf2.json +17 -0
  532. data/standards/stig_zos_ibm_cics_transaction_serverracf.json +17 -0
  533. data/standards/stig_zos_ibm_cics_transaction_servertss.json +17 -0
  534. data/standards/stig_zos_ibm_health_checkeracf2.json +23 -0
  535. data/standards/stig_zos_ibm_health_checkerracf.json +29 -0
  536. data/standards/stig_zos_ibm_health_checkertss.json +29 -0
  537. data/standards/stig_zos_ibm_system_display_and_search_facility_sdsfacf2.json +53 -0
  538. data/standards/stig_zos_ibm_system_display_and_search_facility_sdsfracf.json +59 -0
  539. data/standards/stig_zos_ibm_system_display_and_search_facility_sdsftss.json +53 -0
  540. data/standards/stig_zos_icsfacf2.json +29 -0
  541. data/standards/stig_zos_icsfracf.json +35 -0
  542. data/standards/stig_zos_icsftss.json +35 -0
  543. data/standards/stig_zos_netviewacf2.json +41 -0
  544. data/standards/stig_zos_netviewracf.json +47 -0
  545. data/standards/stig_zos_netviewtss.json +53 -0
  546. data/standards/stig_zos_quest_nc-passacf2.json +35 -0
  547. data/standards/stig_zos_quest_nc-passracf.json +41 -0
  548. data/standards/stig_zos_quest_nc-passtss.json +47 -0
  549. data/standards/stig_zos_racf.json +1415 -0
  550. data/standards/stig_zos_roscoeacf2.json +47 -0
  551. data/standards/stig_zos_roscoeracf.json +53 -0
  552. data/standards/stig_zos_roscoetss.json +59 -0
  553. data/standards/stig_zos_srrauditacf2.json +23 -0
  554. data/standards/stig_zos_srrauditracf.json +23 -0
  555. data/standards/stig_zos_srraudittss.json +23 -0
  556. data/standards/stig_zos_tadzacf2.json +29 -0
  557. data/standards/stig_zos_tadzracf.json +35 -0
  558. data/standards/stig_zos_tadztss.json +35 -0
  559. data/standards/stig_zos_tdmfacf2.json +23 -0
  560. data/standards/stig_zos_tdmfracf.json +23 -0
  561. data/standards/stig_zos_tdmftss.json +23 -0
  562. data/standards/stig_zos_tss.json +1523 -0
  563. data/standards/stig_zos_vssracf.json +29 -0
  564. metadata +691 -0
@@ -0,0 +1,1865 @@
1
+ {
2
+ "name": "stig_idps_security_requirements_guide_srg",
3
+ "date": "2012-03-08",
4
+ "description": "The IDPS Security Requirements Guide (SRG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: fso_spt@disa.mil.",
5
+ "title": "IDPS Security Requirements Guide (SRG)",
6
+ "version": "1",
7
+ "item_syntax": "^\\w-\\d+$",
8
+ "section_separator": null,
9
+ "items": [
10
+ {
11
+ "id": "SRG-NET-000001-IDPS-000021",
12
+ "title": "The IDPS must provide automated support for account management functions.",
13
+ "description": "Account management and distribution is vital to the security of any IDPS. Account management by a designated authority ensures access to IDPS is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Providing automated support functions for the management of accounts will ensure only active accounts will be granted access with the proper authorization levels. If account policies are not immediately and automatically enforced, system administrators may not realize that security changes are not being enforced.",
14
+ "severity": "low"
15
+ },
16
+ {
17
+ "id": "SRG-NET-000002-IDPS-000023",
18
+ "title": "The IDPS must automatically terminate temporary accounts after an organizationally defined time period for each type of account.",
19
+ "description": "Authentication for administrative access to the device is required at all times. Temporary accounts can be used for vendor support in order to perform diagnostics. \nThere is a risk the temporary account may remain in place and active after the vendor support team has left. Temporary accounts could have the highest privilege level which would enable an administrator to gain unauthorized privileges to the device.\nThis requirement is applicable for temporary accounts created for temporary use for vendor support in order to perform diagnostics.",
20
+ "severity": "medium"
21
+ },
22
+ {
23
+ "id": "SRG-NET-000003-IDPS-000022",
24
+ "title": "The IDPS must automatically terminate emergency accounts after an organizationally defined time period.",
25
+ "description": "Authentication for administrative access to the device is required at all times. A single account can be created on the device's local data management console for use in an emergency such as when the authentication server is down or connectivity between the device and the authentication server is not operable. The emergency account logon credentials must be stored in a sealed envelope and kept in a safe. There is a risk the emergency account may remain in place and active after the vendor support team has left.\nThis requirement is applicable for emergency accounts created on the device's local data management console for use in an emergency such as when the authentication server is down or connectivity between the device and the authentication server is not operable.",
26
+ "severity": "low"
27
+ },
28
+ {
29
+ "id": "SRG-NET-000004-IDPS-000024",
30
+ "title": "The IDPS must automatically disable inactive accounts after an organizationally defined time period of inactivity.",
31
+ "description": "There is always a risk for inactive accounts to be compromised by unauthorized users who could then gain full control of the device; thereby enabling them to trigger a Does attacks, intercept sensitive information, or disrupt network availability.\n\nAttackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. The IDPS must track periods of user inactivity and disable application accounts after an organizationally defined period of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised. \n\nTo address the multitude of policy based access requirements, many network administrators choose to integrate the IDPS with enterprise level authentication/access mechanisms that meet or exceed access control policy requirements. Such integration allows the network administrator to off-load those access control functions and focus on core application features and functionality.\n",
32
+ "severity": "low"
33
+ },
34
+ {
35
+ "id": "SRG-NET-000005-IDPS-000028",
36
+ "title": "The IDPS must automatically audit the creation of accounts.",
37
+ "description": "Account management and distribution is vital to the security of any IDPS. Account management by a designated authority ensures access to the IDPS is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. It is imperative that all personnel who are granted accounts have completed and submitted the proper request forms and have been approved by the designated authority. Auditing account creation and modification provides the necessary reconciliation that account management procedures are being followed. To support the auditing requirement, the IDPS must create an audit trail by logging account creation events. Without this audit trail, personnel without the proper security clearance may gain access to critical network nodes.",
38
+ "severity": "low"
39
+ },
40
+ {
41
+ "id": "SRG-NET-000006-IDPS-000025",
42
+ "title": "The IDPS must notify the appropriate individuals when accounts are created.",
43
+ "description": "Account management and distribution is vital to the security of any IDPS. Account management by a designated authority ensures access to IDPS components is secured by granting access to only authorized personnel with the appropriate and necessary privileges. Without a formal approval process for the deployment and modification of accounts, personnel without the proper security clearance may gain access to critical network nodes. It is imperative that all personnel who are granted accounts have completed and submitted the proper request forms and have been approved by the designated authority. Auditing account creation, along with an automatic notification to appropriate individuals, will provide the necessary reconciliation that account management procedures are being followed.",
44
+ "severity": "low"
45
+ },
46
+ {
47
+ "id": "SRG-NET-000007-IDPS-000032",
48
+ "title": "The IDPS must automatically audit account modification.",
49
+ "description": "Account management by a designated authority ensures access to the IDPS is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Auditing account modification along with an automatic notification to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed. If modifications to management accounts are not audited, reconciliation of account management procedures cannot be tracked.",
50
+ "severity": "low"
51
+ },
52
+ {
53
+ "id": "SRG-NET-000008-IDPS-000029",
54
+ "title": "The IDPS must notify the designated system administrators when accounts are modified.",
55
+ "description": "Account management and distribution is vital to the security of any IDPS. Account management by a designated authority ensures access to the IDPS is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Without a formal approval process for the deployment and modification of accounts, personnel without the proper security clearance may gain access to critical network nodes. It is imperative that all personnel who are granted accounts have completed and submitted the proper request forms and have been approved by the designated authority. Auditing account creation and modification, along with an automatic notification to appropriate individuals, will provide the necessary reconciliation that account management procedures are being followed.",
56
+ "severity": "low"
57
+ },
58
+ {
59
+ "id": "SRG-NET-000009-IDPS-000030",
60
+ "title": "The IDPS must automatically audit account disabling actions.",
61
+ "description": "Account management by a designated authority ensures access to the IDPS is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Auditing account creation and modification, along with an automatic notification to appropriate individuals, will provide the necessary reconciliation that account management procedures are being followed. It is also vital that the disablement of accounts is monitored to ensure that authorized active accounts remain enabled and available for use when required.",
62
+ "severity": "low"
63
+ },
64
+ {
65
+ "id": "SRG-NET-000010-IDPS-000026",
66
+ "title": "The IDPS must notify the account owner when the account has been disabled.",
67
+ "description": "Account management by a designated authority ensures access to the IDPS is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Auditing account creation and modification, along with an automatic notification to appropriate individuals, will provide the necessary reconciliation that account management procedures are being followed. It is also vital that the disabling of accounts is monitored to ensure that authorized active accounts remain enabled and available for use when required. Notifying the individual whose account has been disabled will provide an alert, so the account can be enabled if it had been disabled by mistake.",
68
+ "severity": "low"
69
+ },
70
+ {
71
+ "id": "SRG-NET-000011-IDPS-000031",
72
+ "title": "The IDPS must automatically audit account termination.",
73
+ "description": "Account management by a designated authority ensures access to the IDPS is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Auditing account creation and modification, along with an automatic notification to appropriate individuals, will provide the necessary reconciliation that account management procedures are being followed. It is also vital that the termination of accounts is monitored to ensure that authorized accounts remain active and available for use when required.",
74
+ "severity": "low"
75
+ },
76
+ {
77
+ "id": "SRG-NET-000012-IDPS-000027",
78
+ "title": "The IDPS must notify the appropriate individuals for account termination.",
79
+ "description": "Account management by a designated authority ensures access to the IDPS is being controlled in a secured manner by granting access to only authorized personnel with the appropriate and necessary privileges. Automatic notification of account changes to appropriate individuals will provide the necessary reconciliation that account management procedures are being followed. It is also vital that the termination of accounts is monitored to ensure that authorized accounts remain active and available for use when required. Additionally, it is recommended that the notification also alerts the individual whose account has been terminated, so the account can be reinstated if it had been terminated by mistake.",
80
+ "severity": "low"
81
+ },
82
+ {
83
+ "id": "SRG-NET-000013-IDPS-000033",
84
+ "title": "The IDPS must monitor for unusual usage of administrative user accounts.",
85
+ "description": "Atypical account usage is behavior that is not part of normal usage cycles (e.g., accounts logging in after hours or on weekends.) If this atypical behavior is not monitored, user accounts that are compromised could be used by unauthorized users for longer periods, giving an attacker more time to reconfigure the system to allow harmful traffic.\n\nThis control can be met in two ways.\n(i) The IPS provides the capability to learn typical user behavior over time.\n(ii) A rule is created to enforce typical usage based on organizationally defined variable for typical usage (e.g., login hours, duration).",
86
+ "severity": "low"
87
+ },
88
+ {
89
+ "id": "SRG-NET-000014-IDPS-000034",
90
+ "title": "The IDPS must be configured to dynamically manage administrative privileges and associated command authorizations.",
91
+ "description": "Web services are web applications that provide a method of communication between two or more different electronic devices. They are normally used by applications to provide each other with data. In contrast to conventional access control approaches which employ static information system accounts and predefined sets of user privileges, many service-oriented architecture implementations rely on run time access control decisions facilitated by dynamic privilege management. While user identities remain relatively constant over time, user privileges may change more frequently based on the ongoing mission/business requirements and operational needs of the organization. Service Oriented Architecture (SOA) based applications need to take this possibility into account and leverage dynamic access control methodologies. User privileges on the IDPS are configured by assigning users to security groups and assigning permission to the groups.",
92
+ "severity": "medium"
93
+ },
94
+ {
95
+ "id": "SRG-NET-000015-IDPS-000040",
96
+ "title": "The IDPS must be configured to work with an authentication server to enforce the assigned privilege and authorization level for each administrator.",
97
+ "description": "The use of authentication, authorization, and accounting (AAA) affords the best methods for controlling user access, authorization levels, and activity logging. Privilege levels, as well as, which commands each administrator is authorized to use based on the privilege level or account group membership, must be controlled and assigned accordingly. By using the IDPS in conjunction with an authentication server, the administrators can easily add, modify, or delete accounts as well as add or remove command authorizations and privilege levels. The use of an authentication server provides the capability to assign network administrators and engineers to tiered groups that contain their associated or required privilege level. By configuring the IDPS to collaborate with an authentication server, it can enforce the appropriate authorization for each administrator. Additionally, separation of services provides added assurance to the network if the access control server is compromised. This requirement does not apply to local emergency accounts which should be used sparingly. If management of authorizations and privileges is not centralized, it will be difficult to track and manage user authorizations and privileges and there is an increased risk of misconfiguration.\n",
98
+ "severity": "medium"
99
+ },
100
+ {
101
+ "id": "SRG-NET-000016-IDPS-000035",
102
+ "title": "The IDPS must enforce dual authorization based on organizational policies and procedures for organizationally defined privileged commands.",
103
+ "description": "Dual authorization mechanisms require two forms of approval to execute. An organization may determine certain commands or IDPS configuration changes require dual-authorization before being activated. However, an organization should not employ dual authorization mechanisms when an immediate response is necessary to ensure public and environmental safety. If dual authorization is not automatically enforced by the system, system administrators would be able to change the system configuration without oversight from a second administrator when required by the site security policy.\nIf dual authorization is a requirement for the site, this control applies to the IDPS sensor logs and other files.",
104
+ "severity": "medium"
105
+ },
106
+ {
107
+ "id": "SRG-NET-000017-IDPS-000036",
108
+ "title": "The IDPS must implement nondiscretionary access control policies over users and resources.",
109
+ "description": "When nondiscretionary access control mechanisms are implemented, security labels are assigned to securable objects and users are granted access to the objects only if their level of access matches that required by the security label. Types of nondiscretionary access control includes Attribute-Based Access Control, Mandatory Access Control, and Originator Controlled Access Control. Without these security policies, security labels on restricted objects stored on the IDPS may be accessed or changed by unauthorized users.",
110
+ "severity": "low"
111
+ },
112
+ {
113
+ "id": "SRG-NET-000018-IDPS-000041",
114
+ "title": "The IPS must enforce approved authorizations for controlling the flow of information within the network in accordance with applicable policy.",
115
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. \n\nExamples of flow control restrictions include blocking outside traffic claiming to be from within the organization, and not passing any web requests to the Internet not from the internal web proxy.",
116
+ "severity": "medium"
117
+ },
118
+ {
119
+ "id": "SRG-NET-000018-IDPS-000042",
120
+ "title": "The IDPS must allow only in-band management sessions from authorized IP addresses from the internal network.",
121
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Remote administration is inherently dangerous because anyone with a sniffer and access to the right LAN segment can acquire the device account and password information. \n\nWith intercepted information an attacker could gain access to the infrastructure and cause denial of service attacks, intercept sensitive information, or perform other destructive actions.",
122
+ "severity": "medium"
123
+ },
124
+ {
125
+ "id": "SRG-NET-000018-IDPS-000043",
126
+ "title": "The IDPS management console, management server, or data management console server must reside in the management network (in-band.)",
127
+ "description": "Sensors and agents monitor and analyze activity. The term sensor is typically used for the IDPS that monitor networks, including network-based, wireless, and network behavior analysis technologies. The term agent is typically used for host-based IDPS technologies. A management server is a centralized device that receives information from the sensors or agents and manages them. Some management servers perform analysis on the event information that the sensors or agents provide and can identify events that the individual sensors or agents cannot. Matching event information from multiple sensors or agents, such as finding events triggered by the same IP address is known as correlation. Management servers are available as both appliance and software-only products. Some small IDPS deployments do not use any management servers, but most IDPS deployments do. In larger IDPS deployments, there are often multiple management servers, and in some cases there are two tiers of management servers. If the management console is placed on a user segment, management information may be intercepted.",
128
+ "severity": "medium"
129
+ },
130
+ {
131
+ "id": "SRG-NET-000019-IDPS-NA",
132
+ "title": "The network element must enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.",
133
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Example: A router or firewall at the perimeter must only allow web traffic outbound received from a web proxy and directing all returning web traffic to the web proxy. Controlling the flow of information between interconnected networks is the functionality of the router, firewall, and/or switches.",
134
+ "severity": "medium"
135
+ },
136
+ {
137
+ "id": "SRG-NET-000020-IDPS-000044",
138
+ "title": "The IDPS must enforce information flow control using explicit security attributes on information, source, and destination objects as a basis for flow control decisions.",
139
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Restrictions can be enforced based on source and destination IP addresses as well as the ports and services being requested. This requirement should enforce the deny-by-default policy whereby only the known and accepted traffic will be allowed outbound and inbound. This requirement helps ensure that inbound and outbound traffic is inspected for possible attacks.",
140
+ "severity": "medium"
141
+ },
142
+ {
143
+ "id": "SRG-NET-000021-IDPS-000045",
144
+ "title": "The IDPS must enforce the highest privilege level administrative access to enable or disable security policy filters.",
145
+ "description": "The use of AAA affords the best methods for controlling user access, authorization levels, and activity logging. By enabling AAA on the IDPS in conjunction with an authentication server, the administrators can easily add, modify, or delete accounts as well as add or remove command authorizations and privilege levels. The use of an authentication server provides the capability to assign network administrators and engineers to tiered groups containing their associated or required privilege level. The IDPS must be configured to restrict management access according to the privilege level the user has been granted. Authorization to add, modify, or delete security policy filters must require the highest privilege level. If system administrators cannot be configured with different security privileges, then need-to-know cannot be enforced.",
146
+ "severity": "medium"
147
+ },
148
+ {
149
+ "id": "SRG-NET-000022-IDPS-000046",
150
+ "title": "The IDPS must provide the capability for a privileged administrator to configure the organizationally defined security policy filters to support different security policies.",
151
+ "description": "The IDPS must be configured to restrict management access according to the privilege level the user has been granted. Authorization to add, modify, or delete security policies must require the highest privilege level which can be implemented by simply assigning privilege levels to administrators or via a AAA solution. The implementation of a AAA solution affords the best methods for controlling user access, authorization levels, and activity logging. By enabling AAA on the IDPS in conjunction with an authentication server, the administrators can easily add, modify, or delete accounts as well as add or remove command authorizations and privilege levels. The use of an authentication server provides the capability to assign network administrators and engineers to tiered groups that contain their associated or required privilege level. If system administrators cannot be configured with different security policy filters, then need-to-know cannot be enforced.",
152
+ "severity": "medium"
153
+ },
154
+ {
155
+ "id": "SRG-NET-000023-IDPS-000047",
156
+ "title": "The IPS must enforce security policies regarding information on interconnected systems.",
157
+ "description": "Transferring information between interconnected information systems of differing security policies introduces the risk of the transfers violating one or more policies. It is imperative for policy guidance from information owners be implemented at the policy enforcement point between the interconnected systems. This requirement applies to IPS (rather than IDS systems) implementations only because it requires the enforcement of security policy. If IPS is configured to transfer threat information to the firewall or other devices do not adhere to the security policy of the other device, the network security posture for devices interconnected with the IDPS could be compromised.\nEnforcement is done by an IPS and is not a function of an IDS. If the IPS is not configured to authenticate or updates to other network devices violate the access control policy of the other device, this is an issue which must be resolved. However, the IPS must also be configured to monitor and enforce the security policies between other interconnected systems.",
158
+ "severity": "medium"
159
+ },
160
+ {
161
+ "id": "SRG-NET-000024-IDPS-000049",
162
+ "title": "The IDPS must uniquely identify source domains for information transfer.",
163
+ "description": "Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the network element distinguishes between information systems and organizations, and between specific system components or individuals involved in sending and receiving information. \nExamples of information transfer for the IDPS are the sensor log updating the base, sensor alerts, or commands to update the firewall or router ACLs. Without unique identifiers, the audit records of these information transfers would not be useful to tracking possible violations.",
164
+ "severity": "medium"
165
+ },
166
+ {
167
+ "id": "SRG-NET-000025-IDPS-NA",
168
+ "title": "The IDPS must uniquely authenticate source domains for information transfer.",
169
+ "description": "Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the IDPS authenticates the source involved in sending information. Authenticating source domain IP address and other identifiers for users versus organizations and components is not an IDPS function. The IDPS uses IP addresses and other identifiers, but is not the source or organizer of these identifiers.",
170
+ "severity": "medium"
171
+ },
172
+ {
173
+ "id": "SRG-NET-000026-IDPS-000048",
174
+ "title": "The IDPS must uniquely identify destination domains for information transfer.",
175
+ "description": "Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. \nMeans to enforce this enhancement include ensuring the IDPS distinguishes between information systems and organizations, and between specific system components or individuals involved in sending and receiving information.\nExamples of information transfer for the IDPS is the sensor log updating the base, sensor alerts, or commands to update the firewall or router ACLs. Without unique identifiers, the audit records of these information transfers would not be useful to tracking possible violations.",
176
+ "severity": "medium"
177
+ },
178
+ {
179
+ "id": "SRG-NET-000027-IDPS-NA",
180
+ "title": "The IDPS must uniquely authenticate destination domains for information transfer.",
181
+ "description": "Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the IDPS authenticates the source involved in receiving information.",
182
+ "severity": "medium"
183
+ },
184
+ {
185
+ "id": "SRG-NET-000028-IDPS-000050",
186
+ "title": "The IDPS must implement security policies for all traffic flows by using security zones at various protection levels as a basis for flow control decisions.",
187
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Restrictions can be enforced using security zones at various protection levels as a basis for flow control decisions.",
188
+ "severity": "medium"
189
+ },
190
+ {
191
+ "id": "SRG-NET-000029-IDPS-000051",
192
+ "title": "The IDPS must enforce dynamic traffic flow control based on policy allowing or disallowing flows based upon traffic types and rates within or out of profile.",
193
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Restrictions can be enforced based on policy allowing or disallowing flows based upon traffic types and rates within or out of profile.",
194
+ "severity": "medium"
195
+ },
196
+ {
197
+ "id": "SRG-NET-000030-IDPS-NA",
198
+ "title": "All encrypted traffic must be decrypted prior to passing through content inspection and filtering mechanisms.",
199
+ "description": "Allowing traffic to bypass the security checkpoints such as firewalls and intrusion detection systems puts the network infrastructure and critical data at risk. Malicious traffic could enter the network undetected and attack a key IDPS or the server farm. Hence, it is imperative all encrypted traffic entering the network is decrypted prior to the content checking devices. This is a network architecture best practice and does not require a configuration setting on the IDS or IPS sensor.",
200
+ "severity": "medium"
201
+ },
202
+ {
203
+ "id": "SRG-NET-000031-IDPS-NA",
204
+ "title": "The IDPS must terminate all tunnels prior to passing through the perimeter security zone.",
205
+ "description": "Allowing traffic to bypass the security checkpoints such as firewalls and intrusion detection systems puts the network infrastructure and critical data at risk. Malicious traffic could enter the network undetected and attack a key IDPS or the server farm. Hence, it is imperative all tunneled traffic entering the network terminate prior to the content checking devices. This requirement applies to inbound unencrypted traffic.",
206
+ "severity": "medium"
207
+ },
208
+ {
209
+ "id": "SRG-NET-000032-IDPS-000053",
210
+ "title": "The IDPS must enforce organizationally defined one-way traffic flows using hardware mechanisms.",
211
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data.",
212
+ "severity": "medium"
213
+ },
214
+ {
215
+ "id": "SRG-NET-000033-IDPS-000054",
216
+ "title": "The IPS must enforce information flow control using organizationally defined security policy filters as a basis for flow control decisions.",
217
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Restrictions can be enforced based on source and destination IP addresses as well as the ports and services being requested using security policy filters.",
218
+ "severity": "medium"
219
+ },
220
+ {
221
+ "id": "SRG-NET-000034-IDPS-000055",
222
+ "title": "Organizationally defined authorizations must be implemented through organizationally defined separation of duties through use of group memberships.",
223
+ "description": "The use of AAA affords the best methods for controlling authorization levels. The use of an authentication server provides the capability to assign network administrators and engineers to tiered groups containing their associated or required privilege levels establishing what commands and objects the authenticated administrator is authorized to access. This implementation enforces the organization's AAA policy for separation of duties and its responsibility assignments for each administrator. Each account should grant access only to privileges for which the system administrator is authorized. By not restricting system administrators to their proper privilege levels, access to restricted and advanced functions may be provided to system administrators not authorized or trained to use those functions. This requirement does not apply to the local accounts defined directly on the IDPS devices that are used for emergency or diagnostic configuration.",
224
+ "severity": "low"
225
+ },
226
+ {
227
+ "id": "SRG-NET-000035-IDPS-000056",
228
+ "title": "The IDPS must audit the use of privileged accounts when accessing configuration and operational commands enabled for non-privileged accounts.",
229
+ "description": "The IDPS implementation may include tools and applications which are valuable for some network users. By default, non-privileged users cannot access or execute these commands. However, the organization may decide that certain managers or individuals with special roles should be given access (e.g., reporting and analysis tools for the audit group). Changes to the configuration of commands which are limited to privileged users must be captured in the audit log. Monitoring account usage will increase visibility thus reducing the risk of exploitation of privileged accounts by unauthorized persons. Audit logs provide information for use in diagnostic and forensic investigation.",
230
+ "severity": "low"
231
+ },
232
+ {
233
+ "id": "SRG-NET-000036-IDPS-000057",
234
+ "title": "The IDPS must provide the capability for a privileged administrator to configure organizationally defined security policy filters to support different security policies.",
235
+ "description": "Each account should grant access to only those privileges the system administrator is authorized for. By not restricting system administrators to their proper privilege levels, access to restricted and advanced functions may be provided to system administrators not authorized or trained to use those functions. Network disruptions or outages could be caused by mistakes made by inexperienced system administrators. Monitoring account usage will reduce the risk of a privilege account being exploited by unauthorized persons and provides logging to be used for forensic investigation. Only accounts with the highest privilege level should have the authorization to configure security policy filters.",
236
+ "severity": "medium"
237
+ },
238
+ {
239
+ "id": "SRG-NET-000037-IDPS-000157",
240
+ "title": "The IDPS must be configured to automatically disable itself if any of the organizationally defined lists of security events are detected.",
241
+ "description": "To reduce or eliminate the risk to the network, the IDPS must be configured to disable itself and its components if the IDPS itself is compromised. A list of known attacks to the IDPS system must be included in the rules. Since the IDPS is a major part of the network's protection and defense system, a compromised IDPS may allow malicious attacks to bypass the network's controls.",
242
+ "severity": "medium"
243
+ },
244
+ {
245
+ "id": "SRG-NET-000038-IDPS-000058",
246
+ "title": "The maximum number of unsuccessful login attempts must be set to an organizationally defined value.\n",
247
+ "description": "A malicious or unauthorized user could gain access to an IDPS by guessing or using methods such as dictionary attack, word list substitution, or brute force attack-all of which require multiple login attempts. By limiting the number of failed login attempts within a defined period of time, the risk of unauthorized system access via user password guessing can be mitigated.",
248
+ "severity": "medium"
249
+ },
250
+ {
251
+ "id": "SRG-NET-000039-IDPS-000060",
252
+ "title": "The maximum number of unsuccessful login attempts must be set to an organizationally defined value.",
253
+ "description": "By limiting the number of failed login attempts within a defined period of time, the risk of unauthorized system access via user password guessing can be mitigated.",
254
+ "severity": "medium"
255
+ },
256
+ {
257
+ "id": "SRG-NET-000040-IDPS-000059",
258
+ "title": "The IDPS must automatically lock out an account after the maximum number of unsuccessful login attempts are exceeded and remain locked until released by an administrator.",
259
+ "description": "Locking out an account after a maximum number of unsuccessful login attempts are exceeded will reduce the risk of unauthorized system access via password guessing.",
260
+ "severity": "medium"
261
+ },
262
+ {
263
+ "id": "SRG-NET-000041-IDPS-000061",
264
+ "title": "The IDPS must display an approved system use notification message (or banner) before granting access to the system.",
265
+ "description": "All network devices must present a DoD approved warning banner prior to a system administrator logging on. The banner should warn any unauthorized user not to proceed. It also should provide clear and unequivocal notice to both authorized and unauthorized personnel that access to the device is subject to monitoring to detect unauthorized usage. Failure to display the required login warning banner prior to logon attempts will limit the ability to prosecute unauthorized access and also presents the potential to give rise to criminal and civil liability for systems administrators and information systems managers. In addition, DISA's ability to monitor the device's usage is limited unless a proper warning banner is displayed.",
266
+ "severity": "low"
267
+ },
268
+ {
269
+ "id": "SRG-NET-000042-IDPS-000062",
270
+ "title": "The IDPS must display the notification message on the screen until the administrator takes explicit action to acknowledge the message.",
271
+ "description": "All network devices must present a DoD approved warning banner prior to a system administrator logging on. The banner should be acknowledged by the user prior to allowing the user access to the system. This provides assurance that the user has seen the message and accepted the conditions for access. If the warning banner is not acknowledged by the user, DoD will not be in compliance with system use notifications required by law.",
272
+ "severity": "low"
273
+ },
274
+ {
275
+ "id": "SRG-NET-000043-IDPS-000063",
276
+ "title": "The IDPS must display an approved system use notification message or banner before granting access to the device.",
277
+ "description": "All network devices must present a DoD approved warning banner before granting access to the device. The banner shall be formatted in accordance with the DoD policy \"Use of DoD Information Systems - Standard Consent and User Agreement\". If the warning banner is not displayed, DoD will not be in compliance with system use notifications required by law. Use the following verbiage. \n\nYou are accessing a U.S. Government (USG) Information System (IS) that is provided\nfor USG-authorized use only.\nBy using this IS (which includes any device attached to this IS), you consent to the\nfollowing conditions:\n-The USG routinely intercepts and monitors communications on this IS for purposes\nincluding, but not limited to, penetration testing, COMSEC monitoring, network\noperations and defense, personnel misconduct (PM), law enforcement (LE), and\ncounterintelligence (CI) investigations.\n-At any time, the USG may inspect and seize data stored on this IS.\n-Communications using, or data stored on, this IS are not private, are subject to routine\nmonitoring, interception, and search, and may be disclosed or used for any USG authorized\npurpose.\n-This IS includes security measures (e.g., authentication and access controls) to protect\nUSG interests--not for your personal benefit or privacy.\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI\ninvestigative searching or monitoring of the content of privileged communications, or\nwork product, related to personal representation or services by attorneys,\npsychotherapists, or clergy, and their assistants. Such communications and work product\nare private and confidential. See User Agreement for details.\nFor sensors with severe character limitations on the display screen, use the following verbiage:\n\n\"I've read & consent to terms in IS user agreem't.\"",
278
+ "severity": "low"
279
+ },
280
+ {
281
+ "id": "SRG-NET-000048-IDPS-000064",
282
+ "title": "Upon successful logon, the IDPS must display the date and time of the last logon of the user.",
283
+ "description": "Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.",
284
+ "severity": "low"
285
+ },
286
+ {
287
+ "id": "SRG-NET-000049-IDPS-000065",
288
+ "title": "Upon successful logon, the IDPS must display, to the user, the number of unsuccessful logon attempts since the last successful logon.",
289
+ "description": "Providing users with information regarding the number of unsuccessful logon attempts since the last successful login. Without this information, the user may not become aware that unauthorized activity has occurred.",
290
+ "severity": "low"
291
+ },
292
+ {
293
+ "id": "SRG-NET-000050-IDPS-000067",
294
+ "title": "The IDPS must notify the user of the number of successful login attempts to the local device occurring during an organizationally defined time period.",
295
+ "description": "Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.",
296
+ "severity": "low"
297
+ },
298
+ {
299
+ "id": "SRG-NET-000051-IDPS-000066",
300
+ "title": "The IDPS must notify the user of the number of unsuccessful login attempts to the local device occurring during organizationally defined time period.",
301
+ "description": "Providing users with information regarding the number of unsuccessful logon attempts to the local device that has occurred over an organizationally defined time period. Without this information, the user may not become aware that unauthorized activity has occurred.",
302
+ "severity": "low"
303
+ },
304
+ {
305
+ "id": "SRG-NET-000052-IDPS-000068",
306
+ "title": "The IDPS must notify the user of organizationally defined security related changes to the user's account occurring during the organizationally defined time period.",
307
+ "description": "Providing users with information regarding organizationally defined security related changes to the user's account occurring during the organizationally defined time period, allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators. Changes to the user account during a specific time period could be an indication of the account being compromised. Hence, without notification to the user, the compromise could go undetected.",
308
+ "severity": "low"
309
+ },
310
+ {
311
+ "id": "SRG-NET-000053-IDPS-000001",
312
+ "title": "The IDPS must limit the number of concurrent sessions for each account to an organizationally defined number.",
313
+ "description": "This requirement addresses concurrent sessions for a given information system account and does not address concurrent sessions by a single user via multiple accounts. In many products, this value defaults to unlimited which leaves the device open to DoS attacks. An organizationally defined value should be configured.\n\nLimiting the number of concurrent sessions to the device per any given account mitigates the risk associated with a Denial of Service (DoS) attack.",
314
+ "severity": "low"
315
+ },
316
+ {
317
+ "id": "SRG-NET-000054-IDPS-000004",
318
+ "title": "The IDPS must support and maintain the binding of organizationally defined security attributes to information in storage.",
319
+ "description": "Security attribute assignments (e.g., metadata, classification, subject categories, nationality, user access privileges, or affiliation) are abstractions representing the basic properties or characteristics of an entity. Attributes may be bound to data and then used in various applications within the IDPS to enable access control, flow control, information handling, and other information security policy processes. \nTypically, the security attributes used for data stored on the management console or sensors is not granular. The sensors are configured to send data to a management console using IP addresses or other network identifiers. While the data is in storage on the sensors, the system will limit user access based on assigned user account permissions.\nIf the security attributes are disassociated from the information being transmitted, stored, or processed, then access control policies and information flows which depend on these security attributes will not function and unauthorized subjects or entities may gain access to the information.\nThis requirement applies to the event log files and IDPS application files stored on the IDPS management console and sensors.",
320
+ "severity": "medium"
321
+ },
322
+ {
323
+ "id": "SRG-NET-000055-IDPS-000003",
324
+ "title": "The IDPS must support and maintain the binding of organizationally defined security attributes to information in process.",
325
+ "description": "Security attribute assignments (e.g., metadata, classification, user access privileges, or affiliation) are abstractions representing the basic properties or characteristics of an entity. Attributes may be bound to data and then used in various applications within the IDPS to enable access control, flow control, information handling, and other information security policy processes. \nExamples of possible IDPS security attributes that may be used by the organization to implement security policy include: session of packet identifiers; source and destination IP addresses; protocol identifiers; traffic classification based on QoS markings for preferred treatment; or VLAN identification.\nSecurity attributes and labels should be leveraged to protect stored information, as well as information flowing to external devices. Information stored, processed, and transmitted by the IDPS include sensors event logs, local audit logs, and application files. Security attributes and labels must also be leveraged to protect communications between sensors, the management console, non-local management computers, firewalls, routers, and other network elements. \nIf the security attributes are disassociated from the information being transmitted, stored, or processed, then access control policies and information flows which depend on these security attributes will not function and unauthorized subjects or entities may gain access to the information.\n\nExamples of security attributes for IDPS systems include session of packet identifiers; source and destination IP addresses; protocol identifiers; traffic classification based on QoS markings for preferred treatment; or VLAN identification.",
326
+ "severity": "medium"
327
+ },
328
+ {
329
+ "id": "SRG-NET-000056-IDPS-000002",
330
+ "title": "The IDPS must support and maintain the binding of organizationally defined security attributes to information in transmission.",
331
+ "description": "Security attribute assignments (e.g., metadata, classification, user access privileges, or affiliation) are abstractions representing the basic properties or characteristics of an entity. Attributes may be bound to data and then used in various applications within the IDPS to enable access control, flow control, information handling, and other information security policy processes. \nExamples of possible IDPS security attributes that may be used by the organization to implement security policy include: session of packet identifiers; source and destination IP addresses; protocol identifiers; traffic classification based on Quality of Service (QoS) markings for preferred treatment; or Virtual Local Area Network (VLAN) identification.\nSecurity attributes and labels should be leveraged to protect stored information, as well as information flowing to external devices. Information stored, processed, and transmitted by the IDPS include sensors event logs, local audit logs, and application files. Security attributes and labels must also be leveraged to protect communications between sensors, the management console, non-local management computers, firewalls, routers, and other network elements. \nIf the security attributes are disassociated from the information being transmitted, stored, or processed, then access control policies and information flows which depend on these security attributes will not function and unauthorized subjects or entities may gain access to the information.",
332
+ "severity": "medium"
333
+ },
334
+ {
335
+ "id": "SRG-NET-000057-IDPS-000005",
336
+ "title": "The IDPS must dynamically reconfigure security attributes in accordance with an identified security policy as information is created and combined.",
337
+ "description": "Security attribute assignments (e.g., metadata, classification, user access privileges, or affiliation) are abstractions representing the basic properties or characteristics of an entity. Attributes may be bound to data and then used in various applications within the IDPS to enable access control, flow control, information handling, and other information security policy processes. \nExamples of possible IDPS security attributes that may be used by the organization to implement security policy include: session of packet identifiers; source and destination IP addresses; protocol identifiers; traffic classification based on QoS markings for preferred treatment; or VLAN identification.\nSecurity attributes and labels should be leveraged to protect stored information as well as information flowing to external devices. Information stored and processed by the IDPS includes sensors event logs, local audit logs, and application files. Security attributes and labels must also be leveraged to protect communications between sensors, the management console, non-local management computers, firewalls, routers, and other network elements. \nThe IDPS must have the capability to dynamically reconfigure destination addresses, user privilege assignments, and changes to traffic flow requirements. If changes to the security attributes used by upon which security policies, information workflows, and access control are not dynamic, then unauthorized subjects and entities may gain access to the information.",
338
+ "severity": "medium"
339
+ },
340
+ {
341
+ "id": "SRG-NET-000058-IDPS-000006",
342
+ "title": "The IDPS must allow only authorized administrators to change security attributes.",
343
+ "description": "System administrators of the IDPS system can reconfigure the rules and redirect traffic. If an unauthorized user gains access and then modifies the configuration, this could adversely impact the operation and availability of the entire network and all users. Malicious configuration changes may cause the sensors to miss critical attacks. If unauthorized individuals have permission to change security attributes, then unauthorized individuals may compromise information flow and access control attributes, thus adversely impacting network availability or gain unauthorized access to the information.",
344
+ "severity": "high"
345
+ },
346
+ {
347
+ "id": "SRG-NET-000059-IDPS-000007",
348
+ "title": "The IDPS must maintain the binding of security attributes to information with sufficient assurance that the information to attribute association can be used as the basis for automated policy actions.",
349
+ "description": "Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are typically associated with internal data structures (e.g., records, buffers, files) within the IDPS and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. \n\nExamples of automated policy actions include automated access control decisions (e.g., Mandatory Access Control decisions), or decisions to release (or not release) information (e.g., information flows via cross domain systems).\n\nIf the attribute to information binding does have a high assurance, then information security policies based on these attributes may allow unauthorized subjects or entities to gain access to the information or network.",
350
+ "severity": "medium"
351
+ },
352
+ {
353
+ "id": "SRG-NET-000060-IDPS-000008",
354
+ "title": "The IDPS must allow authorized system administrators to associate security attributes with information.",
355
+ "description": "System administrators of the IDPS system can reconfigure the rules and redirect traffic. If an unauthorized user gains access and then modifies the configuration, this could adversely impact the operation and availability of the entire network and all users. Malicious configuration changes may cause the sensors to miss critical attacks.\n\nIf unauthorized individuals have permission to change security attribute-information associations, then unauthorized individuals may compromise information flow and access control attributes, thus adversely impacting network availability or gain unauthorized access to the information.",
356
+ "severity": "high"
357
+ },
358
+ {
359
+ "id": "SRG-NET-000060-IDPS-000009",
360
+ "title": "Accounts must be removed from the IDPS, when no longer required.",
361
+ "description": "Allowing unnecessary or unauthorized accounts may allow for them to be compromised by unauthorized users who could then gain full control of the device. DoS attacks, interception of sensitive information or other destructive actions could then take place.\nUser accounts, group members, and system defined on the IDPS must be necessary for the use of current users and operations. \nIf unused accounts exist, then unauthorized individuals may compromise information flow and access control attributes, thus adversely impacting network availability or gain unauthorized access to the information.",
362
+ "severity": "low"
363
+ },
364
+ {
365
+ "id": "SRG-NET-000060-IDPS-000010",
366
+ "title": "The IPS must only allow authorized devices to change security attributes.",
367
+ "description": "In some implementations, the IPS system may work with the firewalls, routers, or switches to dynamically update or create rules. Changes to the IPS may cause the sensors to miss critical attacks.\nThe IPS sensors are configured to transmit sensor logs using network configuration information. They also may communicate with the Firewall and other network devices. The IPS must have the capability to dynamically reconfigure destination addresses, user privilege assignments, and changes to traffic flow requirements. \nThis requirement is applicable only to IPS implementation allowing external devices to update sensor signatures, rules or other scanning configuration.\nIf unauthorized devices are allowed to update the IPS configuration, information flow and access control attributes may be maliciously changed, thus adversely impacting network availability or gain unauthorized access to the information.",
368
+ "severity": "high"
369
+ },
370
+ {
371
+ "id": "SRG-NET-000061-IDPS-NA",
372
+ "title": "The network element must employ automated mechanisms to facilitate the monitoring and control of remote access methods.",
373
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Monitoring of remote access sessions allows organizations to audit user activities and to ensure compliance with the remote access policy. \nUnless restrictions are put in place, a user connecting to the LAN via remote access can access/perform everything he/she could access/perform as those connected internally. Monitoring will ensure unauthorized access to the enclave's resources and data will not go undetected. However, monitoring and control of remote access methods is not a function of the IDPS.",
374
+ "severity": "medium"
375
+ },
376
+ {
377
+ "id": "SRG-NET-000062-IDPS-000012",
378
+ "title": "Communications using the auxiliary port(s) must be configured to use cryptography to protect the confidentiality of the remote access session.",
379
+ "description": "IDS and IPS devices may have auxiliary port(s) which can be configured for local or non-local (remote) access to management functions and diagnostics. \n\nUse of the modem for remote system management is strongly discouraged because this transmission bypasses the network security infrastructure and depends on authentication provided by the device itself. However, there may be cases where this type of access is mission essential. Modems may be attached to auxiliary ports only if communications are secured using cryptography.\n\nTo provide confidentiality, the data encryption algorithm must meet the following requirements:\n(i) Data encryption algorithm shall be AES using the appropriate key size (128 or 256-bit key) in one of the following modes: CBC, CCM, CFB, CTR, OFB and XTS. \n(ii) The implementation must meet FIPS 140-2, FIPS PUB 197, and NIST SP 800-38 A.\n(iii) Must support the ability to enter a strong passphrase/password that meets FIPS 140-2 standards.\nUnless restrictions are put in place, a user connecting to the LAN via remote access can access/perform everything he/she could access/perform as those connected internally.",
380
+ "severity": "high"
381
+ },
382
+ {
383
+ "id": "SRG-NET-000063-IDPS-000013",
384
+ "title": "The IDPS auxiliary port or modem must be configured to use cryptography to protect the integrity of remote access sessions.",
385
+ "description": "If a modem is installed on the auxiliary port of the IDPS management console to provide direct remote management access, cryptographic mechanisms must be implemented to protect the integrity of information. Unless restrictions are put in place, transmissions over commercial network could be corrupted or altered with malicious traffic. \nThis control requires the configuration of cryptographic modules with strong integrity protection. Integrity protection is provided by the hashing algorithm used by the cryptographic module. Two hashing algorithms are approved for use in DoD. Both algorithms create a checksum that changes if the data is altered. \n(i) Select the Secure Hash Algorithm (SHA-2).\n(ii) Select a keyed, sequenced implementation of the Message Digest (MD5) algorithm only if SHA-2 is not available on the device. \nIntegrity protection also requires the following:\n(i) The firmware of the device must be signed and verified using RSA 2048 or ECDSA with P25.\n(ii) The firmware health checks must be authenticated with either Hashed Message Authentication Code (HMAC-SHA256) or a digital signature (RSA 2048 or ECDSA P256).",
386
+ "severity": "medium"
387
+ },
388
+ {
389
+ "id": "SRG-NET-000064-IDPS-NA",
390
+ "title": "The network element must route all remote access traffic through managed access control points.",
391
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Regardless of the backbone networks used for transit between the user end-point and the remote access server (VPN appliance or firewall), remote connections must be secured and must not be given direct access to the private network. Traffic between the remote access server and the private network must be secured. Therefore, the remote access server must forward traffic destined to the private network to the firewall interface inspecting all private network ingress traffic. Routing remote access traffic through managed access control points is not a function of the IDPS.",
392
+ "severity": "medium"
393
+ },
394
+ {
395
+ "id": "SRG-NET-000065-IDPS-000014",
396
+ "title": "The IDPS must continuously monitor for unauthorized remote connections to specific information systems.",
397
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Monitoring of remote access sessions allows organizations to audit user activities and to ensure compliance with the remote access policy. \nMonitoring will ensure unauthorized access to the enclave's resources and data will not go undetected.",
398
+ "severity": "medium"
399
+ },
400
+ {
401
+ "id": "SRG-NET-000066-IDPS-000015",
402
+ "title": "The network element must audit remote sessions for accessing an organizationally defined list of security functions and security-relevant information.",
403
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Monitoring of remote access sessions allows organizations to audit user activities and to ensure compliance with the remote access policy. \nUnless restrictions are put in place, a user connecting to the LAN via remote access can access/perform everything he/she could access/perform as those connected internally. Auditing will ensure unauthorized access to the enclave's resources and data will not go undetected.",
404
+ "severity": "low"
405
+ },
406
+ {
407
+ "id": "SRG-NET-000067-IDPS-000016",
408
+ "title": "The IDPS must disable use of organizationally defined networking protocols.",
409
+ "description": "Some networking protocols that allow remote access may not meet security requirements to protect data and components. The organization can either make a determination as to the relative security of the networking protocol or management console the security decision on the assessment of other entities.\n\nUnsecure protocols such as TELNET and FTP must be turned off at the device level or the IDPS components may be using these protocols. These protocols are often enabled by default, so the system administrator must ensure an explicit command to disable the disallowed protocols may be required.\n",
410
+ "severity": "medium"
411
+ },
412
+ {
413
+ "id": "SRG-NET-000068-IDPS-NA",
414
+ "title": "The IDPS must enforce requirements for remote connections to the network.",
415
+ "description": "Remote access services enable users outside of the enclave to have access to data and services within the private network. Enabling access to the network from outside introduces security risks which must be addressed through implementation of strict controls and procedures such as authentication and defining what resources can be accessed. Enforcing requirements for remote connections to the network is not a function of the IDPS.",
416
+ "severity": "medium"
417
+ },
418
+ {
419
+ "id": "SRG-NET-000069-IDPS-NA",
420
+ "title": "The IDPS must protect wireless access to the network using authentication.",
421
+ "description": "The security boundary of a Wireless LAN (WLAN) extends from the client device to the network boundary where network access is controlled. This boundary represents the portion of the network most vulnerable to attack and must be protected. Within this boundary there must be two distinct, but related, security protection mechanisms: authentication and data-in-transit encryption. These protections ensure access control and protection from eavesdropping for both the WLAN system and the DoD network enclave. Wireless network authentication is not the function of the IDPS.",
422
+ "severity": "medium"
423
+ },
424
+ {
425
+ "id": "SRG-NET-000070-IDPS-NA",
426
+ "title": "The IDPS must protect wireless access to the network using encryption.",
427
+ "description": "The security boundary of a WLAN extends from the client device to the network boundary where network access is controlled. This boundary represents the portion of the network most vulnerable to attack and must be protected. Within this boundary there must be two distinct, but related, security protection mechanisms: authentication and data-in-transit encryption. These protections ensure access control and protection from eavesdropping for both the WLAN system and the DoD network enclave.",
428
+ "severity": "medium"
429
+ },
430
+ {
431
+ "id": "SRG-NET-000071-IDPS-000017",
432
+ "title": "The site must scan the radio frequency spectrum for unauthorized WLAN devices.",
433
+ "description": "Unauthorized WLAN devices threaten DoD networks in a variety of ways. If someone installs an access point on a DoD network, then people may use that access point to access network resources without any perimeter security controls, which significantly degrades the IA posture of that network. If someone installs an unauthorized access point in the site's vicinity, even if not connected to a DoD network, then site users may unknowingly or inadvertently connect to it. Once this connection occurs, the user's traffic may be diverted to spoofed web sites and other servers to capture the user's authentication credentials and sensitive DoD data. Finally, if an unauthorized WLAN client is operating inside or near the site, it may improperly connect to the site's WLAN infrastructure or other network devices that improperly have left open active Wi-Fi interfaces. WIDS can help counter all of these threats.\n\nDoDD 8100.2 requires ALL DoD networks must use a wireless IDS to scan for unauthorized wireless devices. The WIDS sensor and server must be configured as either a continuous WIDS or a periodic WIDS.",
434
+ "severity": "medium"
435
+ },
436
+ {
437
+ "id": "SRG-NET-000071-IDPS-000018",
438
+ "title": "If the site uses a continuous WIDS scanning, then the system must be configured to meet requirements.",
439
+ "description": "Unauthorized WLAN devices threaten DoD networks in a variety of ways. If someone installs an access point on a DoD network, then people may use that access point to access network resources without any perimeter security controls, which significantly degrades the IA posture of that network. If someone installs an unauthorized access point in the site's vicinity, even if not connected to a DoD network, then site users may unknowingly or inadvertently connect to it. Once this connection occurs, the user's traffic may be diverted to spoofed web sites and other servers to capture the user's authentication credentials and sensitive DoD data. Finally, if an unauthorized WLAN client is operating inside or near the site, it may improperly connect to the site's WLAN infrastructure or other network devices that improperly have left open active Wi-Fi interfaces. WIDS can help counter all of these threats.\nDoDD 8100.2 requires ALL DoD networks use a wireless IDS to scan for unauthorized wireless devices.\nThe continuous WIDS sensor and server must meet the following requirements:\n(I) System is server-based, whereby sensor scanning results are consolidated and evaluated by a WIDS server.\n(ii) The WIDS will scan continuously 24 hours/day, 7 days/week to detect authorized and unauthorized activity. \n(iii) The WIDS will include a location sensing protection scheme for authorized and unauthorized wireless devices that will provide information enabling designated site personnel to take appropriate actions.\n\nWhile not recommended, WLAN access points that also provide WIDS scanning capability are acceptable as \"continuous scanning\" WIDS sensors. \n\nThe WIDS must cover all WLAN frequencies transmitted by the WLAN equipment. The WLAN frequency band can vary by country and the WIDS must cover all channels being used in a country the equipment is being used in. For example, the allowed WLAN channels are different in the U.S., Japan, and many European countries.",
440
+ "severity": "medium"
441
+ },
442
+ {
443
+ "id": "SRG-NET-000071-IDPS-000019",
444
+ "title": "If the site uses periodic WIDS scanning, then the system must be configured to meet the requirements.",
445
+ "description": "Unauthorized WLAN devices threaten DoD networks in a variety of ways. If someone installs an access point on a DoD network, then people may use that access point to access network resources without any perimeter security controls, which significantly degrades the IA posture of that network. If someone installs an unauthorized access point in the site's vicinity, even if not connected to a DoD network, then site users may unknowingly or inadvertently connect to it. Once this connection occurs, the user's traffic may be diverted to spoofed web sites and other servers to capture the user's authentication credentials and sensitive DoD data. Finally, if an unauthorized WLAN client is operating inside or near the site, it may improperly connect to the site's WLAN infrastructure or other network devices that improperly have left open active Wi-Fi interfaces. WIDS can help counter all of these threats.\nDoDD 8100.2 requires ALL DoD networks use a wireless IDS to scan for unauthorized wireless devices.\nWhile not recommended, WLAN access points that also provide WIDS scanning capability are acceptable as \"continuous scanning\" WIDS sensors. \n(I) The DAA will determine how often WIDS scanning will be conducted based on the results of the wireless risk assessment. (DISA recommends at least every 90 days.)\n(ii) Periodic scanning will be conducted by using handheld or laptop WIDS scanners during a walk-through assessment of the network environment.\n\nNOTE: The WIDS must cover all WLAN frequencies transmitted by the WLAN equipment. The WLAN frequency band can vary by country and the WIDS must cover all channels being used in a country the equipment is being used in. For example, the allowed WLAN channels are different in the U.S., Japan, and many European countries.",
446
+ "severity": "medium"
447
+ },
448
+ {
449
+ "id": "SRG-NET-000071-IDPS-000020",
450
+ "title": "WIDS sensor scan results must be saved for at least one year.",
451
+ "description": "DoDD 8100.2 requires ALL DoD networks use a wireless IDS to scan for unauthorized wireless devices. If sites do not maintain scan logs, it cannot be determined if IDS findings are isolated and harmless events or a more sustained, methodical attack on the system.\n",
452
+ "severity": "medium"
453
+ },
454
+ {
455
+ "id": "SRG-NET-000072-IDPS-NA",
456
+ "title": "The IDPS must enforce requirements for the connection of mobile devices to organizational information systems.",
457
+ "description": "Wireless services enable users within close proximity of access points to have access to data and services within the private network. The security boundary of a Wireless LAN extends from the client device to the network boundary where network access is controlled. This boundary represents the portion of the network most vulnerable to attack and must be protected. Wireless access introduces security risks which must be addressed through implementation of strict controls and procedures such as, authentication, encryption, and defining what resources can be accessed.",
458
+ "severity": "low"
459
+ },
460
+ {
461
+ "id": "SRG-NET-000073-IDPS-NA",
462
+ "title": "The IDPS must be configured to disable functionality that provides the capability for automatic execution of code on mobile devices without user direction.",
463
+ "description": "Auto execution vulnerabilities can result in malicious programs being executed that can be used to cause a denial of service on the device and hence disrupt network services. \nExamples of information system functionality that provide the capability for automatic execution of code are Auto Run and AutoPlay. Disabling applications on mobile devices is outside the scope of both the IDS and the IPS.",
464
+ "severity": "low"
465
+ },
466
+ {
467
+ "id": "SRG-NET-000074-IDPS-000081",
468
+ "title": "The IDPS must produce sensor log records that contain sufficient information to establish what type of event occurred.",
469
+ "description": "It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS.",
470
+ "severity": "low"
471
+ },
472
+ {
473
+ "id": "SRG-NET-000075-IDPS-000083",
474
+ "title": "The IDPS must produce log records containing sufficient information to establish when the events occurred.",
475
+ "description": "It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. \nIn order to establish and correlate the series of events leading up to an outage or attack, it is imperative the date and time are recorded in all log records.",
476
+ "severity": "low"
477
+ },
478
+ {
479
+ "id": "SRG-NET-000076-IDPS-000082",
480
+ "title": "The IDPS must produce log records containing sufficient information to establish where the events occurred.",
481
+ "description": "It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. \nIn order to establish and correlate the series of events leading up to an outage or attack, it is imperative the source or object of the log record is recorded in all log records.",
482
+ "severity": "low"
483
+ },
484
+ {
485
+ "id": "SRG-NET-000077-IDPS-000080",
486
+ "title": "The IDPS must produce sensor log records containing sufficient information to establish the source of the event.",
487
+ "description": "It is essential for security personnel to know what is being done, what attempted to be done, when and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. \n\nIf the originator of the log record is not recorded, it will be difficult to establish and correlate the series of events leading up to an outage or attack.",
488
+ "severity": "medium"
489
+ },
490
+ {
491
+ "id": "SRG-NET-000078-IDPS-000084",
492
+ "title": "The IDPS must produce log records containing sufficient information to determine if the event was a success or failure.",
493
+ "description": "It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Denied traffic must be logged. There may also be some instances where a packet that was permitted or other successful event (i.e., logon) should be logged to establish and correlate the series of events leading up to an outage or attack.\nLogging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS.",
494
+ "severity": "low"
495
+ },
496
+ {
497
+ "id": "SRG-NET-000079-IDPS-000076",
498
+ "title": "The IDPS must capture and log sufficient information to establish the identity of any user accounts associated with the event.",
499
+ "description": "Log records content that may be necessary to satisfy the requirement of this control includes: timestamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked. This capability is critical for accurate forensic analysis.",
500
+ "severity": "low"
501
+ },
502
+ {
503
+ "id": "SRG-NET-000080-IDPS-000077",
504
+ "title": "The IDPS must capture and log alerts that contain detailed information for events identified by type, location, and subject.",
505
+ "description": "Audit record content that may be necessary to satisfy the requirement of this control, includes, timestamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked. This capability is critical for accurate forensic analysis.",
506
+ "severity": "low"
507
+ },
508
+ {
509
+ "id": "SRG-NET-000081-IDPS-000078",
510
+ "title": "The IDPS must support the requirement to centrally manage the events from multiple sensor queues.",
511
+ "description": "Centrally managing data captured by the various sensors provides for easier management of network events and is an effective facility for monitoring and the automatic generation of alert notification. The repository of audit data can facilitate troubleshooting when problems are encountered and can assist in performing root cause analysis. A repository of audit data can also be correlated in real time to identify suspicious behavior or be archived for review at a later time for research and analysis.\n\nIDPS sensors are managed from a maintenance console or server installed on the management network. Configuration and management of the sensor configuration, except for initial network configuration, must be performed through accessing the management console. Without the ability to centrally manage events, troubleshooting and correlation of suspicious behavior will be difficult and may lead to or prolong the attack.",
512
+ "severity": "medium"
513
+ },
514
+ {
515
+ "id": "SRG-NET-000082-IDPS-000085",
516
+ "title": "The IDPS must be configured to allocate audit record storage capacity.",
517
+ "description": "The IDPS must allocate storage capacity to contain log records. Log records on the sensors are critical because if space is not available the sensor may malfunction. The site would lose valuable data needed for investigating security incidents.",
518
+ "severity": "low"
519
+ },
520
+ {
521
+ "id": "SRG-NET-000082-IDPS-000087",
522
+ "title": "The IDPS must provide a warning when the logging storage capacity reaches 75% of maximum capacity.",
523
+ "description": "It is imperative the IDPS is configured to allocate storage capacity to contain log records and an alert is generated when the capacity reaches an organization-defined threshold. Without this capability, the site could lose valuable data needed for investigating security incidents.",
524
+ "severity": "low"
525
+ },
526
+ {
527
+ "id": "SRG-NET-000083-IDPS-000079",
528
+ "title": "The IDPS sensor events log monitoring application or mechanism retrieves events from the sensor before the events log becomes full.",
529
+ "description": "The IDPS logging facility must be configured to reduce the likelihood of log record capacity being exceeded. Events on the sensor are typically stored on a large events log. The log in the sensor is typically very large and can hold several days of logging events under normal conditions. However, the monitoring application must retrieve events from the sensor before the queue becomes full; otherwise the sensor will start overwriting the unread events and valuable information may be lost.",
530
+ "severity": "medium"
531
+ },
532
+ {
533
+ "id": "SRG-NET-000083-IDPS-000086",
534
+ "title": "The IDPS logging function must be configured to reduce the likelihood of log record capacity being exceeded.",
535
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. It is imperative the IDPS is configured to allocate enough log record storage capacity that will not become exhausted. Without this capability, the site could lose valuable data needed for investigating security incidents.",
536
+ "severity": "low"
537
+ },
538
+ {
539
+ "id": "SRG-NET-000085-IDPS-000088",
540
+ "title": "The IDPS must provide a real-time alert when organizationally defined audit failure events occur.",
541
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. It is imperative the IDPS is configured to generate an alarm when an audit failure occurs. Because there can be a delay between the sensor queue and the logging server, this alert must come from the sensors themselves.",
542
+ "severity": "low"
543
+ },
544
+ {
545
+ "id": "SRG-NET-000086-IDPS-000090",
546
+ "title": "The IDPS must enforce configurable traffic volume thresholds representing logging capacity for network traffic to be logged.",
547
+ "description": "Different applications have unique requirements and toleration levels for delay, jitter, bandwidth, packet loss, and availability. To manage the multitude of applications and services, a network requires a QoS framework to differentiate traffic and provide a method to avoid and manage network congestion. When network congestion occurs, all traffic has an equal chance of being dropped. QoS categorizes network traffic, prioritizes it according to its relative importance, and provides priority treatment based on the classification. Many DoS attacks target the network core by attempting to saturate link capacity and exhausting router processors. If hackers can compromise QoS trust boundaries, they can amplify the effect of their abuse. When attack traffic receives premium services, it not only forces priority traffic, such as voice, to compete for service, but it also robs critical network management traffic of the service it requires to ensure routing convergence and network availability. Furthermore, it enables the attacker to easily induce a sustained DoS attack on all network resources along the entire path where QoS has been hijacked. It is imperative that traffic marked for premium service is strictly policed. Traffic that is out of profile must be marked down by placing it into a low priority class.",
548
+ "severity": "medium"
549
+ },
550
+ {
551
+ "id": "SRG-NET-000087-IDPS-000089",
552
+ "title": "The IPS must reject or delay network traffic generated above configurable traffic volume thresholds as defined by the organization.",
553
+ "description": "Different applications have unique requirements and toleration levels for delay, jitter, bandwidth, packet loss, and availability. To manage the multitude of applications and services, a network requires a QoS framework to differentiate traffic and provide a method to avoid and manage network congestion. When network congestion occurs, all traffic has an equal chance of being dropped. QoS categorizes network traffic, prioritizes it according to its relative importance, and provides priority treatment based on the classification. Many DoS attacks target the network core by attempting to saturate link capacity and exhausting router processors. If hackers can compromise QoS trust boundaries, they can amplify the effect of their abuse. When attack traffic receives premium services, it not only forces priority traffic such as voice to compete for service, it robs critical control-plane and network management traffic the service it demands to ensure routing convergence and network availability. Furthermore, it enables the attacker to easily induce a sustained DoS attack on all network resources along the entire path where QoS has been hijacked. It is imperative that traffic marked for premium service is strictly policed. Traffic that is out of profile must be marked down by placing it into a low priority class.",
554
+ "severity": "medium"
555
+ },
556
+ {
557
+ "id": "SRG-NET-000088-IDPS-000092",
558
+ "title": "The IDPS must be configured to send an alert to designated personnel in the event of an audit processing failure.",
559
+ "description": "Auditing and logging are key components of any security architecture. It is essential that security personnel know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify a IDPS that has been configured improperly. It is imperative that the IDPS is configured to generate an alarm when an audit failure occurs.",
560
+ "severity": "medium"
561
+ },
562
+ {
563
+ "id": "SRG-NET-000089-IDPS-000093",
564
+ "title": "The IDPS must be configured to stop generating log records or overwrite the oldest log records when an audit failure occurs.",
565
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. To preserve recent audit information, if an audit failure occurs, the IDPS must either stop producing audit records to overwrite or purge the oldest records.",
566
+ "severity": "low"
567
+ },
568
+ {
569
+ "id": "SRG-NET-000090-IDPS-000094",
570
+ "title": "The IDPS must integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities.",
571
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple the IDPS to acquire a clear understanding as to what happened or is happening. Collecting log data and presenting that data in a single, consolidated view achieves this objective.",
572
+ "severity": "low"
573
+ },
574
+ {
575
+ "id": "SRG-NET-000091-IDPS-NA",
576
+ "title": "The IDPS must centralize the review and analysis of audit records from multiple network elements within the network.",
577
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple the IDPS to acquire a clear understanding as to what happened or is happening. Collecting log data and presenting the data in a single, consolidated view achieves this objective.",
578
+ "severity": "low"
579
+ },
580
+ {
581
+ "id": "SRG-NET-000092-IDPS-000234",
582
+ "title": "The IDPS must employ automated mechanisms to alert security personnel of any inappropriate or unusual activities with security implications.",
583
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. By immediately displaying an alarm message, potential security violations can be identified more immediately, even when administrators are not logged into the IDPS.",
584
+ "severity": "medium"
585
+ },
586
+ {
587
+ "id": "SRG-NET-000093-IDPS-000096",
588
+ "title": "Audit log reduction must be enabled on the IDPS.",
589
+ "description": "Log reduction is the capability of a system to consolidate, archive and compress audit logs. This process saves space when saving these logs over a long time period. Log entries must not be removed from the log in order to reduce the size; however, the file may be compressed.",
590
+ "severity": "low"
591
+ },
592
+ {
593
+ "id": "SRG-NET-000094-IDPS-NA",
594
+ "title": "The IDPS must provide a report generation capability.",
595
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple the IDPS to acquire a clear understanding as to what happened or is happening. Collecting log data and aggregating it to present the data in a single, consolidated report achieves this objective.",
596
+ "severity": "low"
597
+ },
598
+ {
599
+ "id": "SRG-NET-000095-IDPS-000095",
600
+ "title": "The IDPS must provide the capability to automatically process log records for events of interest based upon selectable criteria.",
601
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple the IDPS to acquire a clear understanding as to what happened or is happening. Collecting log data and enabling personnel to filter the data based on selection criteria to produce a meaningful view achieves this objective.",
602
+ "severity": "low"
603
+ },
604
+ {
605
+ "id": "SRG-NET-000096-IDPS-000099",
606
+ "title": "The IDPS must use internal system clocks to generate timestamps for audit records.",
607
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. In order to determine what is happening within the network infrastructure or to resolve and trace an attack, it is imperative to correlate the log data from multiple the IDPS to acquire a clear understanding as to what happened or is happening. In order to correlate, timestamps are needed on all of the log records.",
608
+ "severity": "low"
609
+ },
610
+ {
611
+ "id": "SRG-NET-000096-IDPS-000100",
612
+ "title": "The IDPS must protect audit tools from unauthorized deletion.",
613
+ "description": "Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may provide the only means to manipulate and manage application and system log data. If the tools are compromised it could provide attackers with the capability to manipulate log data. It is imperative for audit tools to be controlled and protected from unauthorized modification. Audit tools include, but are not limited to, OS provided audit tools, vendor provided audit tools and open source audit tools needed to successfully view and manipulate audit information system activity and records.",
614
+ "severity": "medium"
615
+ },
616
+ {
617
+ "id": "SRG-NET-000097-IDPS-000097",
618
+ "title": "The IDPS must be configured to use a minimum of two Network Time Protocol (NTP) servers to synchronize time.",
619
+ "description": "The various components within the network infrastructure providing the log records must have their clocks synchronized using a common time reference so the events can be correlated in exact order of time. Without synchronized time, accurately correlating information between devices becomes difficult, if not impossible. If sensor logs cannot be correlated with the routers, switches, and firewalls, it may not be possible to trace all the damage caused by a network breach. NTP provides an efficient and scalable method for network elements to synchronize to an accurate time source.",
620
+ "severity": "low"
621
+ },
622
+ {
623
+ "id": "SRG-NET-000097-IDPS-000098",
624
+ "title": "The IDPS must authenticate NTP messages received.",
625
+ "description": "Since NTP is used to ensure accurate log file timestamp information, NTP could pose a security risk if a malicious user were able to falsify NTP information. To launch an attack on the NTP infrastructure, a hacker could inject time that would be accepted by NTP clients by spoofing the IP address of a valid NTP server. To mitigate this risk, the time messages must be authenticated by the client before accepting them as a time source. Two NTP-enabled devices can communicate in either client-server mode or peer-to-peer mode (aka \"symmetric mode\"). The peering mode is configured manually on the device and indicated in the outgoing NTP packets. The fundamental difference is the synchronization behavior: an NTP server can synchronize to a peer with better stratum, whereas it will never synchronize to its client regardless of the client's stratum. From a protocol perspective, NTP clients are no different from the NTP servers. The NTP client can synchronize to multiple NTP servers, select the best server and synchronize with it, or synchronize to the averaged value returned by the servers. A hierarchical model can be used to improve scalability. With this implementation, an NTP client can also become an NTP server providing time to downstream clients at a higher stratum level and of decreasing accuracy than that of its upstream server. To increase availability, NTP peering can be used between NTP servers. In the event the device looses connectivity to it upstream NTP server, it will be able to choose time from one of its peers. The NTP authentication model is opposite of the typical client-server authentication model. NTP authentication enables an NTP client or peer to authenticate time received from their servers and peers. It's not used to authenticate NTP clients because NTP servers don't care about the authenticity of their clients, as they never accept any time from them.",
626
+ "severity": "medium"
627
+ },
628
+ {
629
+ "id": "SRG-NET-000098-IDPS-000107",
630
+ "title": "The IDPS must protect application audit and sensor event logs information from unauthorized read access.",
631
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured system. Audit and event log data must be protected from unauthorized access, including from legitimate administrators who are not do not have a need for this type of access. Without this protection, a compromise or loss of log data needed for incident analysis or risk assessment. \nThere are two types of log files required for IDPS components, the sensor event log/queue and the application audit trail log. The sensor event log stores detected events based on sensor network scans. The application level audit trail log stores auditing results of enforcement actions based on the access control restrictions and other security policy for the IDPS itself.",
632
+ "severity": "medium"
633
+ },
634
+ {
635
+ "id": "SRG-NET-000100-IDPS-000109",
636
+ "title": "The IDPS must protect application audit and sensor event logs are protected from unauthorized deletion.",
637
+ "description": "Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured system. Audit and event log data must be protected from unauthorized access, including from legitimate administrators who are not do not have a need for this type of access. Unauthorized deletion of logs or events may obfuscate evidence of an attack. Event log and sensor log entries should not be deleted without a clear audit trail and an approval process.\nThere are two types of log files required for IDPS components, the sensor event log/queue and the application audit trail log. The sensor event log stores detected events based on sensor network scans. The application level audit trail log stores auditing results of enforcement actions based on the access control restrictions and other security policy for the IDPS itself.",
638
+ "severity": "medium"
639
+ },
640
+ {
641
+ "id": "SRG-NET-000101-IDPS-000101",
642
+ "title": "The IDPS must protect audit tools from unauthorized access.",
643
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. It is imperative the auditing tools are secured and can only be accessed by authorized personnel.",
644
+ "severity": "low"
645
+ },
646
+ {
647
+ "id": "SRG-NET-000102-IDPS-000102",
648
+ "title": "The IDPS must protect audit tools from unauthorized modification.",
649
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. It is imperative the auditing tools are secured and can only be accessed by authorized personnel.",
650
+ "severity": "low"
651
+ },
652
+ {
653
+ "id": "SRG-NET-000104-IDPS-NA",
654
+ "title": "The IDPS must produce audit records on hardware-enforced write-once media.",
655
+ "description": "It is imperative the collected log data from the various the IDPS is secured and stored on write-once media for safekeeping.\nThis is not applicable for IDPS. Sensor logs are aggregated onto a separate partition on the management console and are then backed-up in accordance with CCI-000537 and CCI-001348.",
656
+ "severity": "low"
657
+ },
658
+ {
659
+ "id": "SRG-NET-000105-IDPS-000104",
660
+ "title": "The IDPS must backup system level and sensor event log records on an organizationally defined frequency onto a different system or media.",
661
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Without the backup of logged data, the actions of specific events, the site's ability to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS., will be degraded. \nThere are two types of log files required for IDPS components, the sensor event log/queue and the application audit trail log. The sensor event log stores detected events based on sensor network scans. The application level audit trail log stores auditing results of enforcement actions based on the access control restrictions and other security policy for the IDPS itself. It is imperative the collected log data from the various IDPS components be secured and backed up regularly unto a different system or off-line media.",
662
+ "severity": "low"
663
+ },
664
+ {
665
+ "id": "SRG-NET-000106-IDPS-000105",
666
+ "title": "The IDPS must use cryptographic mechanisms to protect the integrity of audit and sensor event log information.",
667
+ "description": "Without the use of mechanisms, such as a signed hash using asymmetric cryptography, the integrity of the collected audit data is not fully protected. There are two types of log files required for IDPS components, the sensor event log/queue and the application audit trail log. The sensor event log stores detected events based on sensor network scans. The application level audit trail log stores auditing results of enforcement actions based on the access control restrictions and other security policy for the IDPS itself.\nThis control requires the configuration of a cryptographic module with strong integrity protection. Integrity protection is provided by the hashing algorithm used by the cryptographic module.",
668
+ "severity": "medium"
669
+ },
670
+ {
671
+ "id": "SRG-NET-000107-IDPS-000106",
672
+ "title": "The IDPS must use cryptography to protect the integrity of audit tools.",
673
+ "description": "Audit tools provide services such as audit reduction, reporting, or analysis. Without mechanisms such as a signed hash using asymmetric cryptography, the integrity of the collected data garnered from these tools is not fully protected. Mechanisms such as a signed hash using asymmetric cryptography must be used to protect the integrity of the audit tools used for audit reduction and reporting.",
674
+ "severity": "low"
675
+ },
676
+ {
677
+ "id": "SRG-NET-000107-IDPS-000108",
678
+ "title": "The IDPS must protect application audit and sensor event log information from unauthorized modification.",
679
+ "description": "Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured system. Audit and event log data must be protected from unauthorized access, including from legitimate administrators who are not do not have a need for this type of access. Without this protection, a compromise or loss of log data needed for incident analysis or risk assessment. \nThere are two types of log files required for IDPS components, the sensor event log/queue and the application audit trail log. The sensor event log stores detected events based on sensor network scans. The application level audit trail log stores auditing results of enforcement actions based on the access control restrictions and other security policy for the IDPS itself.",
680
+ "severity": "medium"
681
+ },
682
+ {
683
+ "id": "SRG-NET-000108-IDPS-000069",
684
+ "title": "The IDPS must log administrator access and system configuration changes in a central logging server such as a management console/server.",
685
+ "description": "This requirement supports non-repudiation of actions taken by an administrator and is required in order to maintain the integrity of the configuration management process. All configuration changes to the IDPS are logged; and system administrators authenticate with 2-factor authentication before gaining administrative access. Together, these processes will ensure the administrators can be held accountable for the configuration changes they implement.",
686
+ "severity": "medium"
687
+ },
688
+ {
689
+ "id": "SRG-NET-000110-IDPS-000070",
690
+ "title": "The IDPS must provide a centralized management console/server that compiles data from the agents and sensors.",
691
+ "description": "Sensors and agents monitor and analyze activity. The term sensor is typically used for the IDPS that monitor networks, including network-based, wireless, and network behavior analysis technologies. The term agent is typically used for host-based IDPS technologies. A management server is a centralized device that receives information from the sensors or agents and manages them. Some management servers perform analysis on the event information that the sensors or agents provide and can identify events that the individual sensors or agents cannot. Matching event information from multiple sensors or agents, such as finding events triggered by the same IP address, is known as correlation. Management servers are available as both appliance and software-only products. Some small IDPS deployments do not use any management servers, but most IDPS deployments do. In larger IDPS deployments, there are often multiple management servers, and in some cases there are two tiers of management servers. Centralized audit and log records are essential for quickly investigating network attacks.",
692
+ "severity": "medium"
693
+ },
694
+ {
695
+ "id": "SRG-NET-000110-IDPS-000071",
696
+ "title": "The IDPS management consoles must be logically installed on the management network.",
697
+ "description": "The central management console or data management console server. Provide a central location to store, view, analyze, and produce detailed reports on alerts. This server must be installed on a protected network segment to limit access to normal user traffic.",
698
+ "severity": "medium"
699
+ },
700
+ {
701
+ "id": "SRG-NET-000112-IDPS-000072",
702
+ "title": "The IDPS must produce a system-wide audit trail composed of log records in a standardized format.",
703
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS.\nThe IDPS consists of a management console/server which aggregates the application audit trail log from the sensors and management server. The audit trail log is the application log rather than the sensor events log. The IDPS will also aggregate the sensor event logs from all the sensors onto the management console/server. Centralized audit and log records are essential for quickly investigating network attacks.",
704
+ "severity": "medium"
705
+ },
706
+ {
707
+ "id": "SRG-NET-000113-IDPS-000073",
708
+ "title": "The IDPS must generate log records for alerts determined by the organization to be relevant to the security of the network infrastructure.",
709
+ "description": "Sensor alerts are stored on each sensor and then periodically transferred to a central management or logging server database. Centrally logging the sensor information provides a central location to store, view, analyze, and produce detailed reports on alerts. Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. Many events such as configuration changes and login success or failure are mandated by this control; however organizations may also define additional events for logging. The sensor's primary responsibility is to monitor its network segment for suspicious activity. The management console is a central management, auditing, and data storage point for a large number of sensors.",
710
+ "severity": "medium"
711
+ },
712
+ {
713
+ "id": "SRG-NET-000114-IDPS-000074",
714
+ "title": "The IDPS must allow administrators to select which rule sets are to be logged at the management console and sensor level.",
715
+ "description": "All sensors of the IDPS must be configurable with the organizationally defined rules. This requirement does not require each sensor be configured with separate rule sets; however, this capability must be available to meet the need to respond to future attack vectors. If administrators do not have granular control of the rule to be applied and logged for later analysis, then malicious attacks may be missed.",
716
+ "severity": "medium"
717
+ },
718
+ {
719
+ "id": "SRG-NET-000115-IDPS-000075",
720
+ "title": "The IDPS must generate log alerts for locally developed sensor rules.",
721
+ "description": "Logging specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. Locally developed sensor rules may be developed incorrectly and may not be configured for proper alerting. These rules implement organizationally defined security policies and are used to tailor the IDPS sensors to meet organizational requirements not provided by default vendor rules and updates (e.g., IAVMs).",
722
+ "severity": "medium"
723
+ },
724
+ {
725
+ "id": "SRG-NET-000118-IDPS-000116",
726
+ "title": "The IDPS must enforce access restrictions associated with changes to the information system.",
727
+ "description": "Changes to the hardware or software components of the IDPS can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the IDPS for implementing any changes or upgrades. This requirement applies to update of the application files, configuration, and signatures. Changes to the operating system will be addressed in the operating system STIG.",
728
+ "severity": "medium"
729
+ },
730
+ {
731
+ "id": "SRG-NET-000119-IDPS-000110",
732
+ "title": "The IDPS must be configured to enable automated mechanisms to enforce access restrictions.",
733
+ "description": "Changes to the hardware or software components of the IDPS can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the IDPS for implementing any changes or upgrades.",
734
+ "severity": "medium"
735
+ },
736
+ {
737
+ "id": "SRG-NET-000120-IDPS-000111",
738
+ "title": "The IDPS must be configured to enable automated mechanisms to support auditing of the enforcement actions.",
739
+ "description": "Changes to the hardware or software components of the IDPS can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals allowed administrative access to the IDPS for implementing any changes or upgrades. Additionally, maintaining automated log records of access is essential for ensuring configuration change control is being implemented as intended and for supporting after-the-fact actions should the organization become aware of an unauthorized change to the information system.",
740
+ "severity": "medium"
741
+ },
742
+ {
743
+ "id": "SRG-NET-000121-IDPS-000112",
744
+ "title": "The IDPS must prevent the installation of organizationally defined critical software programs not signed with a certificate that is recognized and approved by the organization.",
745
+ "description": "Changes to any software components of the IDPS can have significant effects on the overall security of the network. Verifying the authenticity of the software prior to installation validates the integrity of the patch or upgrade received from a vendor. This ensures the software has not been tampered with and that it has been provided by a trusted vendor. Software must be obtained from a trusted patch server not from the vendor. The IDPS sensors should not have to verify the software again. Additional services should not be installed on the sensors.",
746
+ "severity": "medium"
747
+ },
748
+ {
749
+ "id": "SRG-NET-000122-IDPS-000113",
750
+ "title": "The IDPS must enforce a two-person rule for changes to organizationally defined information system components and system-level information.",
751
+ "description": "Changes to any software components of the IDPS can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the IDPS for implementing any changes or upgrades to system components. Enforcing a two-person rule will ensure the changes have been approved.",
752
+ "severity": "medium"
753
+ },
754
+ {
755
+ "id": "SRG-NET-000123-IDPS-000114",
756
+ "title": "The IDPS must limit privileges to change software resident within software libraries.",
757
+ "description": "Changes to any software components of the IDPS can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the IDPS for implementing any changes or upgrades. If the IDPS were to enable non-authorized users to make changes to software libraries, those changes could be implemented without undergoing the appropriate testing, validation, and approval.",
758
+ "severity": "medium"
759
+ },
760
+ {
761
+ "id": "SRG-NET-000124-IDPS-000115",
762
+ "title": "The IDPS must implement automatic safeguards and countermeasures if security functions or mechanisms are changed inappropriately.",
763
+ "description": "Changes to any software components of the IDPS can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals are allowed administrative access to the IDPS for implementing any changes or upgrades. In order to ensure a prompt response to unauthorized changes to IDPS security functions, the organizations will define the safeguards the device must undertake in the event these changes occur.",
764
+ "severity": "medium"
765
+ },
766
+ {
767
+ "id": "SRG-NET-000125-IDPS-000117",
768
+ "title": "The IDPS must employ automated mechanisms to centrally manage configuration settings.",
769
+ "description": "Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for the IDPS can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an aid for troubleshooting network problems.",
770
+ "severity": "medium"
771
+ },
772
+ {
773
+ "id": "SRG-NET-000126-IDPS-000118",
774
+ "title": "The IDPS must employ automated mechanisms to centrally apply configuration settings.",
775
+ "description": "Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for the IDPS can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an aid for troubleshooting network problems.",
776
+ "severity": "medium"
777
+ },
778
+ {
779
+ "id": "SRG-NET-000127-IDPS-000119",
780
+ "title": "The IDPS must employ automated mechanisms to centrally verify configuration settings.",
781
+ "description": "Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for the IDPS can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an aid for troubleshooting network problems.",
782
+ "severity": "medium"
783
+ },
784
+ {
785
+ "id": "SRG-NET-000128-IDPS-000120",
786
+ "title": "The IDPS must employ automated mechanisms to respond to unauthorized changes to organizationally defined configuration settings.",
787
+ "description": "Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for the IDPS can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an automatic mechanism to initiate an alert when an unauthorized change has been detected.",
788
+ "severity": "medium"
789
+ },
790
+ {
791
+ "id": "SRG-NET-000129-IDPS-000121",
792
+ "title": "The IDPS must ensure that detected unauthorized security-relevant configuration changes are tracked.",
793
+ "description": "Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for the IDPS can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an automatic mechanism to track detected unauthorized security-relevant configuration changes.",
794
+ "severity": "medium"
795
+ },
796
+ {
797
+ "id": "SRG-NET-000131-IDPS-000123",
798
+ "title": "The IDPS must not have unnecessary services and capabilities enabled.",
799
+ "description": "A compromised IDPS introduces risk to the entire network infrastructure as well as data resources that are accessible via the network. The perimeter defense has no oversight or control of attacks by malicious users within the network. The perimeter defense has no oversight or control of attacks by malicious users within the network. Prevention of network breaches from within the network requires a comprehensive defense-in-depth strategy, including security all devices connecting to the network. This is accomplished by following and implementing all security guidance applicable for each node type. A fundamental step in securing each IDPS is to only enable the services and capabilities required for operation.",
800
+ "severity": "medium"
801
+ },
802
+ {
803
+ "id": "SRG-NET-000131-IDPS-000125",
804
+ "title": "The sensor must be configured to alarm if unexpected protocols for network management enter the subnet.",
805
+ "description": "The management network must detect all attacks on the management hosts. The management network has a range of traffic that is permitted. Some of the following traffic is allowed on the Management Hosts Segment: Trivial File Transfer Protocol (TFTP [UDP 69])-For network device configuration files from devices on the Managed Devices Segment; FTP-Data (TCP 20)-For file transfers to network devices on the Managed Devices Segment and for Internet downloads; FTP-Control (TCP 21)-For file transfers to network devices on the Managed Devices Segment and for Internet downloads; Sysco (UDP 514)-From network devices on the Managed Devices Segment; Telnet (TCP 23)-To network devices on the Managed Devices Segment; SSH (TCP 22)-To network devices on the Managed Devices Segment; Network Time Protocol (NTP [UDP 123])-To synchronize the clocks of all network devices on the Managed Devices Segment; HTTP (TCP 80)-To the Internet and from hosts on other segments to download the host-based IPS agent software; HTTPS (TCP 443)-To network devices on the Managed Devices Segment and the Internet as well as between the host-based IPS Console and its agents; TACACS+ (TCP 49)-For administrator authentication to devices on the Managed Devices Segment; RADIUS (UDP 1812/1813 authentication/accounting)-For authentication of administrator remote-access VPN connections coming from the Remote Administration Segment; ICMP (IP Protocol 1)-Echo request and response to reach network devices on the Managed Devices Segment and the Internet; DNS (UDP 53)-For name translation services for management hosts as they access services on the Internet; Simple Network Management Protocol (SNMP [UDP 161])-To query information from network devices on the Managed Devices Segment; SNMP-Trap (UDP 162)-To receive trap information from network devices on the Managed Devices Segment.",
806
+ "severity": "medium"
807
+ },
808
+ {
809
+ "id": "SRG-NET-000132-IDPS-000124",
810
+ "title": "The IDPS must be configured to prohibit or restrict the use of ports, protocols, and services in accordance with organizationally defined requirements.",
811
+ "description": "A compromised network element introduces risk to the entire network infrastructure as well as data resources that are accessible via the network. The perimeter defense has no oversight or control of attacks by malicious users within the network. The perimeter defense has no oversight or control of attacks by malicious users within the network. Prevention of network breaches from within the network requires a comprehensive defense-in-depth strategy, including security all devices connecting to the network. This is accomplished by following and implementing all security guidance applicable for each node type. A fundamental step in securing each IDPS is to only enable the ports, protocols, and services required for operation. The IDPS application must not be configured to use ports, protocols or services which are prohibited by the Ports, Protocol, and Service Management (PPSM) requirements.",
812
+ "severity": "medium"
813
+ },
814
+ {
815
+ "id": "SRG-NET-000132-IDPS-NA",
816
+ "title": "The IDPS must employ automated mechanisms to detect the addition of unauthorized components or devices.",
817
+ "description": "Centrally managing configuration changes for all network devices can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an automatic mechanism to track the status of applicable vulnerabilities. Keeping an up-to-date inventory of all network devices and their components provides the framework for the implementation of a comprehensive configuration and problem management system. An inventory of components and their features provides a mechanism for tracking vulnerabilities of affected products which can be used for automated patch management and upgrades. Monitoring may be accomplished on an ongoing basis or by the periodic scanning. Automated mechanisms can be implemented within the network.\nCentrally managing configuration of network devices and tracking vulnerable is not the role of an IDPS.",
818
+ "severity": "medium"
819
+ },
820
+ {
821
+ "id": "SRG-NET-000133-IDPS-000122",
822
+ "title": "The IDPS must employ automated mechanisms to prevent program execution in accordance with organization defined specifications.",
823
+ "description": "A compromised IDPS introduces risk to the entire network infrastructure as well as data resources accessible via the network. The perimeter defense has no oversight or control of attacks by malicious users within the network. Prevention of network breaches from within the network requires a comprehensive defense-in-depth strategy, including security all devices connecting to the network. This is accomplished by following and implementing all security guidance applicable for each node type. A fundamental step in securing each IDPS is to only enable the services required for operation. Any form of automatic execution should be disabled as it can easily be exploited by hackers to infect hosts with malware and viruses.",
824
+ "severity": "medium"
825
+ },
826
+ {
827
+ "id": "SRG-NET-000134-IDPS-000126",
828
+ "title": "A periodic or continuous monitoring IDS or IPS must be installed to scan the network.",
829
+ "description": "Monitoring may be accomplished on an ongoing basis or by the periodic scanning. Automated mechanisms can be implemented within the network.",
830
+ "severity": "medium"
831
+ },
832
+ {
833
+ "id": "SRG-NET-000135-IDPS-000127",
834
+ "title": "The IDPS must support organizational requirements to conduct backups of user-level information contained in the device per organizationally defined frequency that is consistent with recovery time and recovery point objectives.",
835
+ "description": "User information contained on an IDPS is associated to the users account and the resources the user is authorized to access. If this information becomes corrupted by hardware failures or by a malicious user, it must be restored immediately to ensure network access availability. Backing up this information is a critical step for data recovery.",
836
+ "severity": "low"
837
+ },
838
+ {
839
+ "id": "SRG-NET-000136-IDPS-000128",
840
+ "title": "The IDPS must support organizational requirements to conduct backups of system-level information contained in the information system per organizationally defined frequency.",
841
+ "description": "System information contained on an IDPS contains default and customized attributes, as well as software required for the execution and operation of the device. If this information becomes corrupted by hardware failures or by a malicious user, it must be restored immediately to ensure network availability. Backing up this information is a critical step for data recovery.",
842
+ "severity": "low"
843
+ },
844
+ {
845
+ "id": "SRG-NET-000137-IDPS-000129",
846
+ "title": "The IDPS must support organizational requirements to conduct backups of information system documentation including security related documentation per organizationally defined frequency that is consistent with recovery time and recovery point object",
847
+ "description": "System information contained on an IDPS contains default and customized attributes as well as software required for the execution and operation of the device. If this information becomes corrupted by hardware failures or by a malicious user, it must be restored immediately to ensure network availability. Backing up this information is a critical step for data recovery.",
848
+ "severity": "low"
849
+ },
850
+ {
851
+ "id": "SRG-NET-000138-IDPS-NA",
852
+ "title": "The IDPS must enforce the identification and authentication of all organizational users.",
853
+ "description": "Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organization's security policy. Access to the network must be categorized as administrator, user, or guest so the appropriate authorization can be assigned to the user requesting access to the network or IDPS. Authorization requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of user identities is accomplished through the use of passwords, tokens, biometrics, or in the case of multi-factor authentication, some combination thereof. Lack of authentication enables anyone to gain access to the network or possibly an IDPS providing opportunity for intruders to compromise resources within the network infrastructure. \nThe IDPS does not enforce identification and authentication of all organizational users. Non-privileged users are not authorized to authenticate to the sensors or management consoles.",
854
+ "severity": "medium"
855
+ },
856
+ {
857
+ "id": "SRG-NET-000139-IDPS-000130",
858
+ "title": "The IDPS must use multifactor authentication for network access to privileged accounts.",
859
+ "description": "Multifactor authentication uses two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g. password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nA privileged account is defined as: \nAn information system account with authorizations of a privileged user. \n\nNetwork Access is defined as: \nAccess to an information system by a user (or a process acting on behalf of a user) communicating through a network (e.g., local area network, wide area network, Internet).\n\nMultifactor authentication provides strong protection for authentication mechanisms. Without a strong authentication method, the system is more easily breached by standard access control attacks.\n",
860
+ "severity": "medium"
861
+ },
862
+ {
863
+ "id": "SRG-NET-000139-IDPS-000131",
864
+ "title": "Management connections to the IDPS must require authentication.",
865
+ "description": "Devices protected with weak password schemes or no password at all, provide the opportunity for anyone to crack the password or gain access to the device and cause network, device, or information damage or denial of service.",
866
+ "severity": "medium"
867
+ },
868
+ {
869
+ "id": "SRG-NET-000140-IDPS-NA",
870
+ "title": "The IDPS must use multi-factor authentication for network access to non-privileged accounts.",
871
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g. password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nA non-privileged account is defined as: \nAn information system account with authorizations of a regular or non-privileged user. \n\nNetwork Access is defined as: \nAccess to an information system by a user (or a process acting on behalf of a user) communicating through a network (e.g., local area network, wide area network, Internet).\n\nNon-privileged users are not authorized to authenticate to the sensors or management consoles.\n",
872
+ "severity": "medium"
873
+ },
874
+ {
875
+ "id": "SRG-NET-000141-IDPS-000132",
876
+ "title": "The IDPS must use multi-factor authentication for local access to privileged accounts.",
877
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g. password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nNon-privileged account: An information system account with authorizations of a regular or non-privileged user. \n\nLocal access: Access to an organizational information system by a user (or process acting on behalf of a user) communicating through a direct connection without the use of a network.\nMultifactor authentication provides strong protection for authentication mechanisms. Without a strong authentication method, the system is more easily breached by standard access control attacks.",
878
+ "severity": "medium"
879
+ },
880
+ {
881
+ "id": "SRG-NET-000142-IDPS-NA",
882
+ "title": "The IDPS must use multifactor authentication for local access to non-privileged accounts.",
883
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g. password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nNon-privileged account: An information system account with authorizations of a regular or non-privileged user. \n\nLocal access: Access to an organizational information system by a user (or process acting on behalf of a user) communicating through a direct connection without the use of a network.\nMultifactor authentication provides strong protection for authentication mechanisms. Without a strong authentication method, the system is more easily breached by standard access control attacks.",
884
+ "severity": "medium"
885
+ },
886
+ {
887
+ "id": "SRG-NET-000143-IDPS-000133",
888
+ "title": "System administrators must be authenticated with an individual authenticator prior to using a group authenticator.",
889
+ "description": "To assure individual accountability and prevent unauthorized access, organizational users shall be individually identified and authenticated. Sharing group accounts on any device is prohibited. If group accounts are not changed when individuals leave the group, that person could gain control of the network device. However, there are times when they are deemed mission essential. The security architecture of the IDPS and any installed applications must allow use of an individual authenticator (e.g., AAA server or Active Directory authentication) prior to using individual authentications.",
890
+ "severity": "medium"
891
+ },
892
+ {
893
+ "id": "SRG-NET-000144-IDPS-000134",
894
+ "title": "The IDPS must enforce multifactor authentication for network access to privileged accounts where one of the factors is provided by a device separate from the IDPS being accessed.",
895
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g. password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nA privileged account is defined as: An information system account with authorizations of a privileged user. \n\nWhen one of the authentication factors is provided by a device that is separate from the system that is gaining access, this is referred to as \"out of band two factor authentication\". OOB2FA employs separate communication channels at least one of which is independently maintained and trusted to authenticate an end user. One channel could be a mobile device that is registered to the user. Upon a logon attempt, the system sends instructions to the device in the form of on-screen prompts that instruct the user how to complete the login process.\nMultifactor authentication provides strong protection for authentication mechanisms. Without a strong authentication method, the system is more easily breached by standard access control attacks.",
896
+ "severity": "medium"
897
+ },
898
+ {
899
+ "id": "SRG-NET-000145-IDPS-NA",
900
+ "title": "The IDPS must enforce multifactor authentication for network access to non-privileged accounts where one of the factors is provided by a device separate from the IDPS being accessed.",
901
+ "description": "Multifactor authentication is defined as: using two or more factors to achieve authentication. \n\nFactors include: \n(i) something you know (e.g. password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric). \n\nA non-privileged account is defined as: An information system account with authorizations of a regular or non-privileged user. \n\nWhen one of the authentication factors is provided by a device that is separate from the system that is gaining access, this is referred to as \"out of band 2 factor authentication\".\n",
902
+ "severity": "medium"
903
+ },
904
+ {
905
+ "id": "SRG-NET-000146-IDPS-000135",
906
+ "title": "The IDPS must use organizationally defined replay-resistant authentication mechanisms for network access to privileged accounts.",
907
+ "description": "All authentication credentials must be maintained on an authentication server. Messages between the authenticator and the IDPS validating user credentials must not be vulnerable to a replay attack possibly enabling an unauthorized user to gain access to any IDPS. A replay attack is a form of a network attack in which a valid session or series of IP packets is intercepted by a malicious user who at a later time transmits the packets to gain access to the target device.",
908
+ "severity": "medium"
909
+ },
910
+ {
911
+ "id": "SRG-NET-000147-IDPS-NA",
912
+ "title": "The IDPS must use organizationally defined replay-resistant authentication mechanisms for network access to non-privileged accounts.",
913
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. The authenticator must be a separate device than the target device for which the individual is requesting access to. Therefore, all authentication credentials must be maintained on an authentication server. Messages between the authenticator and the IDPS validating user credentials must not be vulnerable to a replay attack possibly enabling an unauthorized user to gain access to any IDPS. A replay attack is a form of a network attack in which a valid session or series of IP packets is intercepted by a malicious user who at a later time transmits the packets to gain access to the target device.",
914
+ "severity": "medium"
915
+ },
916
+ {
917
+ "id": "SRG-NET-000148-IDPS-000139",
918
+ "title": "The IDPS must authenticate an organizationally defined list of specific devices by device type before establishing a connection.",
919
+ "description": "An IDPS must have a level of trust with any node wanting to connect to it. The remote node could be a host device requiring a layer 2 connection to the network or a router wanting to peer as a neighbor and establish a connection to exchange control plane and forwarding plane traffic. A network control plane is comprised of routing, signaling, and link management protocols; all used to establish the forwarding paths required by the data plane. Disrupting the flow of this information or injecting false information breaks down the integrity or believability of path information.",
920
+ "severity": "low"
921
+ },
922
+ {
923
+ "id": "SRG-NET-000149-IDPS-000136",
924
+ "title": "The IDPS must authenticate devices before establishing remote network connections using bidirectional authentication between cryptographically based devices.",
925
+ "description": "An IDPS must have a level of trust with any node wanting to connect to it. The remote node could be a host device requiring a layer 2 connection to the network or a router wanting to peer as a neighbor and establish a connection to exchange control plane and forwarding plane traffic. A network control plane is comprised of routing, signaling, and link management protocols; all used to establish the forwarding paths required by the data plane. Disrupting the flow of this information or injecting false information breaks down the integrity or believability of path information. To safeguard these connections it is imperative the connecting device authenticate itself prior to granting access. In the case of peering neighbors, the authentication must be bidirectional. Regardless of the paradigm, authentication must use a form of cryptography to ensure a high level of trust and authenticity.",
926
+ "severity": "medium"
927
+ },
928
+ {
929
+ "id": "SRG-NET-000150-IDPS-000137",
930
+ "title": "The IDPS must authenticate devices before establishing wireless network connections using bidirectional authentication between cryptographically based devices.",
931
+ "description": "Without authentication, an unauthorized device can easily connect to a nearby access-point (AP) within the enclave. In addition, a rogue AP owned by an attacker can accept connections from wireless stations enabling it to intercept traffic and initiate man-in-the-middle attacks before allowing traffic to flow to the intended host. Hence, it is imperative that authentication is bi-directional (mutual authentication) using cryptography to ensure a high level of trust and authenticity.\n\nDevice authentication requires unique identification and authentication that may be defined by type, by specific device, or by a combination of type and device as deemed appropriate by the organization.\nThe devices typically use either shared known information (e.g., Media Access Control [MAC] or Transmission Control Protocol/Internet Protocol [TCP/IP] addresses) for identification or an organizational authentication solution (e.g., IEEE 802.1x and Extensible Authentication Protocol [EAP], Radius server with EAP Transport\nLayer Security [TLS] authentication, Kerberos) to identify and authenticate devices on local and/or wide\narea networks.",
932
+ "severity": "medium"
933
+ },
934
+ {
935
+ "id": "SRG-NET-000151-IDPS-000138",
936
+ "title": "The network element must authenticate devices before establishing network connections using bidirectional authentication between cryptographically based devices.",
937
+ "description": "An IDPS must have a level of trust with any node wanting to connect to it. The remote node could be a host device requiring a layer 2 connection to the network or a router wanting to peer as a neighbor and establish a connection to exchange control plane and forwarding plane traffic. A network control plane is comprised of routing, signaling, and link management protocols; all used to establish the forwarding paths required by the data plane. Disrupting the flow of this information or injecting false information breaks down the integrity or believability of path information. To safeguard these connections it is imperative the connecting device authenticate itself prior to granting access. In the case of peering neighbors, the authentication must be bidirectional. Regardless of the paradigm, authentication must use a form of cryptography to ensure a high level of trust and authenticity.",
938
+ "severity": "medium"
939
+ },
940
+ {
941
+ "id": "SRG-NET-000152-IDPS-NA",
942
+ "title": "The IDPS must dynamically manage identifiers, attributes, and associated access authorizations to enable user access to the network with the appropriate and authorized privileges.",
943
+ "description": "Web services are web applications that provide a method of communication between two or more different electronic devices. They are normally used by applications to provide each other with data. The W3C defines a web service a, \"a software system designed to support interoperable machine to machine interaction over a network. It has an interface described in a machine processable format (specifically Web Services Description Language or WSDL). Other systems interact with the web service in a manner prescribed by its description using SOAP messages typically conveyed using HTTP with an XML serialization in conjunction with other web-related standards\". Web services provide different challenges in managing access than what is presented by typical user based applications. In contrast to conventional access control approaches which employ static information system accounts and predefined sets of user privileges, many service-oriented architecture implementations rely on run time access control decisions facilitated by dynamic privilege management. While user identities remain relatively constant over time, user privileges may change more frequently based on the ongoing mission/business requirements and operational needs of the organization. In contrast to conventional approaches to identification and authentication which employ static information system accounts for preregistered users, many service-oriented architecture implementations rely on establishing identities at run time for entities that were previously unknown. Dynamic establishment of identities and association of attributes and privileges with these identities are anticipated and provisioned. Pre-established trust relationships and mechanisms with appropriate authorities to validate identities and related credentials are essential.",
944
+ "severity": "medium"
945
+ },
946
+ {
947
+ "id": "SRG-NET-000153-IDPS-000142",
948
+ "title": "The IDPS must enforce minimum password length.",
949
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Password length is one factor in determining password strength. Use of a longer password string will exponentially increase the time and/or resources required to compromise the password.\nInformation systems not protected with strong password schemes including passwords of minimum length provide the opportunity for anyone to crack the password thus gaining access to the system and causing the device, information, or the local network to be compromised or a denial of service. \n\n",
950
+ "severity": "medium"
951
+ },
952
+ {
953
+ "id": "SRG-NET-000154-IDPS-000143",
954
+ "title": "The IDPS must prohibit password reuse for the organizationally defined number of generations.",
955
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. A password must have an expiration date to limit the amount of time a compromised password can be used by a malicious user.",
956
+ "severity": "medium"
957
+ },
958
+ {
959
+ "id": "SRG-NET-000155-IDPS-000150",
960
+ "title": "The IDPS must enforce password complexity by the number of upper case characters used.",
961
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Combination of upper case, lower case, numbers, and special characters enhances the complexity of the password string.",
962
+ "severity": "low"
963
+ },
964
+ {
965
+ "id": "SRG-NET-000156-IDPS-000151",
966
+ "title": "The IDPS must enforce password complexity by the number of lower case characters used.",
967
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Combination of upper case, lower case, numbers, and special characters enhances the complexity of the password string.",
968
+ "severity": "medium"
969
+ },
970
+ {
971
+ "id": "SRG-NET-000157-IDPS-000149",
972
+ "title": "The IDPS must enforce password complexity by the number of numeric characters used.",
973
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Combination of upper case, lower case, numbers, and special characters enhances the complexity of the password string.",
974
+ "severity": "low"
975
+ },
976
+ {
977
+ "id": "SRG-NET-000158-IDPS-000141",
978
+ "title": "The IDPS must enforce password complexity by the number of special characters used.",
979
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. Combination of upper case, lower case, numbers, and special characters enhances the complexity of the password string.\nUse of a complex password helps to increase the time and resources required to compromise the password.",
980
+ "severity": "medium"
981
+ },
982
+ {
983
+ "id": "SRG-NET-000159-IDPS-000148",
984
+ "title": "The IDPS must enforce the number of characters changed when passwords are changed.",
985
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. It is imperative when changing the password it results in a password not similar to the previous password.",
986
+ "severity": "low"
987
+ },
988
+ {
989
+ "id": "SRG-NET-000160-IDPS-000147",
990
+ "title": "The IDPS must enforce password encryption for storage.",
991
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. The IDPS can be compromised by personnel with physical access to the communication room. It is imperative for passwords to be stored encrypted, so they cannot be viewed by unauthorized staff.",
992
+ "severity": "high"
993
+ },
994
+ {
995
+ "id": "SRG-NET-000161-IDPS-000144",
996
+ "title": "The IDPS must enforce password encryption for transmission.",
997
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. The IDPS can be compromised by personnel with access to the network. Passwords sent in the clear can be intercepted and used by unauthorized personnel to gain administrative access to the IDPS. It is imperative to encrypt passwords before transmitting during any authentication process.",
998
+ "severity": "high"
999
+ },
1000
+ {
1001
+ "id": "SRG-NET-000162-IDPS-000146",
1002
+ "title": "The IDPS must enforce minimum password lifetime restrictions.",
1003
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. \nA password must have an expiration date to limit the amount of time a compromised password can be used by a malicious user. However, changing the password too frequently may result in the user changing a small portion of the password, or the user could mishandle the password in an attempt to remember the new password.",
1004
+ "severity": "medium"
1005
+ },
1006
+ {
1007
+ "id": "SRG-NET-000163-IDPS-000145",
1008
+ "title": "The IDPS must enforce maximum password lifetime restrictions.",
1009
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks, as well as, brute-force attacks. A password must have an expiration date to limit the amount of time a compromised password can be used by a malicious user.",
1010
+ "severity": "medium"
1011
+ },
1012
+ {
1013
+ "id": "SRG-NET-000164-IDPS-000152",
1014
+ "title": "The IDPS must validate certificates used for PKI-based authentication by constructing a certification path with status information to an accepted trust anchor.",
1015
+ "description": "A trust anchor is an authoritative entity represented via a public key. Within a chain of trust, the top entity to be trusted is the \"root certificate\" or \"trust anchors\" such as a Certification Authority (CA). A certification path starts with the Subject certificate and proceeds through a number of intermediate certificates up to a trusted root certificate, typically issued by a trusted CA. Path validation is necessary for a relying party to make an informed trust decision when presented with any certificate not already explicitly trusted.",
1016
+ "severity": "medium"
1017
+ },
1018
+ {
1019
+ "id": "SRG-NET-000165-IDPS-000153",
1020
+ "title": "The IDPS must enforce authorized access to the corresponding private key for PKI-based authentication.",
1021
+ "description": "The principle factor of PKI implementation is the private key used to encrypt or digitally sign information. If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure.",
1022
+ "severity": "medium"
1023
+ },
1024
+ {
1025
+ "id": "SRG-NET-000166-IDPS-000154",
1026
+ "title": "The IDPS must map the authenticated identity to the user account for PKI-based authentication.",
1027
+ "description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure that only the assigned individual is using the account, the account must be bound to a user certificate when PKI-based authentication is implemented.",
1028
+ "severity": "medium"
1029
+ },
1030
+ {
1031
+ "id": "SRG-NET-000167-IDPS-000155",
1032
+ "title": "The IDPS must obscure feedback of authentication information during the authentication process to protect the information from possible use by unauthorized individuals.",
1033
+ "description": "Authorization for access to any IDPS requires an approved and assigned individual account identifier. To ensure that only the assigned individual is using the account, the account holder must create a strong password that is privately maintained and changed based on the organizationally defined frequency. During the authentication process, malicious users can gain knowledge of passwords during authentication process by sniffing local traffic between the IDPS and the authentication server or even walking by a user logging on and viewing what had been keyed in. It is imperative the IDPS prevents any form of authentication feedback that can be used to learn account passwords.",
1034
+ "severity": "medium"
1035
+ },
1036
+ {
1037
+ "id": "SRG-NET-000168-IDPS-000156",
1038
+ "title": "For password protection, the IDPS must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.",
1039
+ "description": "the IDPS not protected with strong passwords provide the opportunity for anyone to crack the password thus gaining access to the system and the network. All passwords must be kept and known only by the account user who created the password. Malicious users can gain knowledge of passwords during authentication process by sniffing local traffic between the IDPS and the authentication server. It is imperative the authentication process implements cryptographic modules adhering to the higher standards approved by the federal government.",
1040
+ "severity": "medium"
1041
+ },
1042
+ {
1043
+ "id": "SRG-NET-000169-IDPS-NA",
1044
+ "title": "The network element must uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.",
1045
+ "description": "Non-organizational users shall be uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization when related to the use of anonymous access. Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organizations security policy. Access to the network must be categorized as administrator, user, or guest, so the appropriate authorization can be assigned to the user requesting access to the network or a network element. Authorization requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of user identities is accomplished through the use of passwords, tokens, biometrics, or in the case of multifactor authentication, some combination thereof. Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity for intruders to compromise resources within the network infrastructure. By identifying and authenticating non-organizational users, their access to network resources can be restricted accordingly.",
1046
+ "severity": "medium"
1047
+ },
1048
+ {
1049
+ "id": "SRG-NET-000170-IDPS-000158",
1050
+ "title": "The IDPS must employ automated mechanisms to assist in the tracking of security incidents.",
1051
+ "description": "Despite the investment in perimeter defense technologies, enclaves are still faced with detecting, analyzing, and remediating network breaches and exploits that have made it past the firewall. \nAn automated incident response infrastructure allows network operations to immediately react to incidents by identifying, analyzing, and mitigating any compromised network or the IDPS. Incident response teams can perform root cause analysis, determine how the exploit proliferated, identify all affected nodes, as well as, contain and eliminate the threat.\n",
1052
+ "severity": "medium"
1053
+ },
1054
+ {
1055
+ "id": "SRG-NET-000171-IDPS-000091",
1056
+ "title": "The IDPS must invoke a system shutdown in the event of the log failure, unless an alternative audit capability exists.",
1057
+ "description": "It is critical when a network device is at risk of failing to process audit logs as required; it takes action to mitigate the failure. If the device were to continue processing without auditing enabled, a network device or the network itself could be compromised without any information that can be used for the trace back of an attack and for forensic analysis.",
1058
+ "severity": "medium"
1059
+ },
1060
+ {
1061
+ "id": "SRG-NET-000172-IDPS-000159",
1062
+ "title": "The IDPS must use automated mechanisms to restrict the use of maintenance tools to authorized personnel only.",
1063
+ "description": "With the growth of widespread network delivered malware infections, organizations tend to overlook the spread of malware from system to system through removable media. Once an infected media is connected to the information system, any worms on it will spread through the system. Maintenance tools connecting to an IDPS for diagnostics could be carrying malware; therefore, their use must be restricted to authorized personnel.",
1064
+ "severity": "medium"
1065
+ },
1066
+ {
1067
+ "id": "SRG-NET-000173-IDPS-000160",
1068
+ "title": "The IDPS must log non-local maintenance and diagnostic sessions.",
1069
+ "description": "Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured IDPS. If events associated with a non-local administrative access or diagnostic session are not logged, a major tool for assessing and investigating attacks would not be available.\nThis requirement pertains to the use of privileged access when using the GUI or SSH to connect non-locally for the purpose of diagnostic session on the servers and network elements.",
1070
+ "severity": "low"
1071
+ },
1072
+ {
1073
+ "id": "SRG-NET-000174-IDPS-000162",
1074
+ "title": "The IDPS must protect non-local maintenance sessions through the use of two-factor authentication.",
1075
+ "description": "Without authentication anyone with logical access can access IDPS components allowing intruders to compromise resources within the network infrastructure. Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organizations security policy. Authorization for access to any IDPS requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of all administrator accounts for all privilege levels must be accomplished using two or more factors that include the following:\n\n(i) something you know (e.g., password/PIN); \n(ii) something you have (e.g., cryptographic identification device, token); or \n(iii) something you are (e.g., biometric).\n",
1076
+ "severity": "medium"
1077
+ },
1078
+ {
1079
+ "id": "SRG-NET-000175-IDPS-000161",
1080
+ "title": "The IDPS must protect non-local maintenance sessions by separating the maintenance session from other network sessions with the device, by using either physically separated communications paths, or logically separated communications paths based upon encryption.",
1081
+ "description": "Network management is the process of monitoring the IDPS and links, configuring the IDPS, and enabling network services. Network management also includes the collection of performance, diagnostics, and other relevant data about each element to ensure availability and that services are being delivered to meet or exceed service level agreements. Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. From an architectural perspective, implementing out of band (OOB) management for the IDPS is a best practice and the first step in the deployment of a management network. OOBM networks isolate network users from communication channels dedicated to network management and thereby provide traffic separation to increase security for all network management activities. The management network should have a direct link with local connection to the managed the IDPS. Where this is not possible, the management traffic can traverse over the production network or transient IP backbone via private encrypted tunnel. The OOBM access switch will connect to the management interface of the managed network elements. The management interface of the managed network element will be directly connected to the OOBM network. An OOBM interface does not forward transit traffic; thereby, providing complete separation of production and management traffic. Since all management traffic is immediately forwarded into the management network, it is not exposed to possible tampering. The separation also ensures that congestion or failures in the managed network do not affect the management of the device. If the OOBM interface does not have an IP address from the managed network address space, it will not be accessible from the NOC using scalable and normal control plane and forwarding mechanisms.",
1082
+ "severity": "medium"
1083
+ },
1084
+ {
1085
+ "id": "SRG-NET-000176-IDPS-000163",
1086
+ "title": "The IDPS must employ cryptographic mechanisms to protect the integrity and confidentiality of non-local maintenance and diagnostic communications.",
1087
+ "description": "Network management is the process of monitoring the IDPS and links, configuring the IDPS, and enabling network services. Network management also includes the collection of performance, diagnostics, and other relevant data about each element to ensure availability and that services are being delivered to meet or exceed service level agreements. Whether a network is being managed locally or from a NOC, achieving network management objectives depends on comprehensive and reliable network management solutions. If packets associated with these sessions are not encrypted, the integrity and confidentiality of non-local maintenance and diagnostics is at risk.\n\nTo provide confidentiality, the data encryption algorithm must meet the following requirements:\n(i) Data encryption algorithm shall be AES using the appropriate key size (128 or 256-bit key) in one of the following modes: CBC, CCM, CFB, CTR, OFB and XTS. \n(ii) The implementation must meet FIPS 140-2, FIPS PUB 197, and NIST SP 800-38 A.\n(iii) The implementation must support the ability to enter a strong passphrase/password that meets FIPS 140-2 standards.",
1088
+ "severity": "medium"
1089
+ },
1090
+ {
1091
+ "id": "SRG-NET-000177-IDPS-000164",
1092
+ "title": "The IDPS must enforce identification and authentication for the establishment of non-local maintenance and diagnostic sessions.",
1093
+ "description": "Lack of authentication enables anyone to gain access to the network or possibly an IDPS providing opportunity for intruders to compromise resources within the network infrastructure. Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organizations security policy. Authorization for access to any IDPS to perform maintenance and diagnostics requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of non-local maintenance and diagnostics sessions must be accomplished through two-factor authentication via the combination of passwords, tokens, and biometrics.",
1094
+ "severity": "medium"
1095
+ },
1096
+ {
1097
+ "id": "SRG-NET-000178-IDPS-000165",
1098
+ "title": "The IDPS must terminate all sessions when non-local maintenance is completed.",
1099
+ "description": "In the event the remote node has abnormally terminated or an upstream link from the managed device is down, the management session will be terminated; thereby, freeing device resources and eliminating any possibility of an unauthorized user being orphaned to an open idle session of the managed device.",
1100
+ "severity": "medium"
1101
+ },
1102
+ {
1103
+ "id": "SRG-NET-000179-IDPS-000166",
1104
+ "title": "The IDPS must use cryptographic mechanisms to protect and restrict access to information on portable digital media.",
1105
+ "description": "When data is written to portable digital media, there is risk of loss of data along with integrity and data confidentiality. An organizational assessment of risk guides the selection of media and associated information contained on the media requiring restricted access. Organizations document in policy and procedures, the media requiring restricted access, individuals authorized to access the media, and the specific measures taken to restrict access. Fewer protection measures are needed for media containing information determined by the organization to be in the public domain, to be publicly releasable, or to have limited or no adverse impact if accessed by other than authorized personnel. In these situations, it is assumed the physical access controls where the media resides provide adequate protection.",
1106
+ "severity": "medium"
1107
+ },
1108
+ {
1109
+ "id": "SRG-NET-000180-IDPS-000167",
1110
+ "title": "The IDPS must employ cryptographic mechanisms to protect information in storage.",
1111
+ "description": "When data is written to digital media, there is risk of loss of data along with integrity and data confidentiality. An organizational assessment of risk guides the selection of media and associated information contained on the media requiring physical protection. Fewer protection measures are needed for media containing information determined by the organization to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on the organization or individuals if accessed by other than authorized personnel. In these situations, it is assumed the physical access controls to the facility where the media resides provide adequate protection. As part of a defense-in-depth strategy, the organization considers routinely encrypting information at rest on selected secondary storage devices. The employment of cryptography is at the discretion of the information owner/steward. The selection of the cryptographic mechanisms used is based upon maintaining the confidentiality and integrity of the information. The strength of mechanisms is commensurate with the classification and sensitivity of the information.\nSensor event logs and application audit logs must be encrypted while in storage on the sensors or management console hard drive or other digital media.",
1112
+ "severity": "medium"
1113
+ },
1114
+ {
1115
+ "id": "SRG-NET-000181-IDPS-000168",
1116
+ "title": "The IDPS must be configured to detect the presence of unauthorized software on organizational information systems.",
1117
+ "description": "The goal of running vulnerability assessment scans is to identify devices on your network that are open to known vulnerabilities. Malicious software such as Trojan horses, hacker tools, DDoS (Distributed Denial of Service) agents, and spyware can establish a management console on individual desktops and servers. Many of these are not detected by anti-virus software or even host intrusion detection systems. Without the detection and prevention of malicious software, unauthorized users may gain access to sensitive data by assuming the identity of authorized users.",
1118
+ "severity": "medium"
1119
+ },
1120
+ {
1121
+ "id": "SRG-NET-000181-IDPS-000169",
1122
+ "title": "The IDPS administrator will review whitelists and blacklists regularly and validate all entries to ensure they are still accurate and necessary.",
1123
+ "description": "A blacklist is a list of discrete entities, such as hosts, TCP or UDP port numbers, ICMP types and codes, applications, usernames, URLs, filenames, or file extensions, that have been previously determined to be associated with malicious activity. Blacklists, also known as hot lists, are typically used to allow the IDPS to recognize and block activity that is highly likely to be malicious, and may also be used to assign a higher priority to alerts that match entries on the blacklists. Some IDPS generate dynamic blacklists that are used to temporarily block recently detected threats. A whitelist is a list of discrete entities that are known to be benign. Whitelists are typically used on a granular basis, such as protocol-by-protocol, to reduce or ignore false positives involving known benign activity from trusted hosts. Whitelists and blacklists are most commonly used in signature-based detection and stateful protocol analysis. Without the use of validated and up-to-date blacklists and whitelists, recently discovered malicious software, sites, or protocols may be missed by the IDPS monitoring functionality.",
1124
+ "severity": "medium"
1125
+ },
1126
+ {
1127
+ "id": "SRG-NET-000182-IDPS-NA",
1128
+ "title": "The network elements must separate user traffic from network management traffic.",
1129
+ "description": "Network management is the process of monitoring network elements and links, configuring network elements to turn up and disable network services, the collection of performance, diagnostics, and other relevant data about each element to ensure availability and that services are being delivered to meet or exceed service level agreements. Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. From an architectural perspective, implementing out-of-band (OOB) management for network element is a best practice and the first step in the deployment of a management network. OOBM networks isolate network users from communication channels dedicated to network management and thereby provide traffic separation to increase security for all network management activities.",
1130
+ "severity": "medium"
1131
+ },
1132
+ {
1133
+ "id": "SRG-NET-000183-IDPS-000186",
1134
+ "title": "The IDPS must prevent the exposure of network management traffic onto a user or production network.",
1135
+ "description": "Network management is the process of monitoring the IDPS and links, configuring the IDPS to turn up and disable network services, the collection of performance, diagnostics, and other relevant data about each element to ensure availability and that services are being delivered to meet or exceed service level agreements. Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. From an architectural perspective, implementing out of band (OOB) management for the IDPS is a best practice and the first step in the deployment of a management network. OOBM networks isolate network users from communication channels dedicated to network management and thereby provide traffic separation to increase security for all network management activities. If management traffic traverses the user network, privileged information could be leaked to unauthorized users. The IDPS is not a subnetting device; however, sensor can be placed to monitor each subnet for possible leaks between the user production network and the management network to provide added assurance for traffic separation.",
1136
+ "severity": "medium"
1137
+ },
1138
+ {
1139
+ "id": "SRG-NET-000184-IDPS-000200",
1140
+ "title": "The IDPS must isolate security functions from non-security functions.",
1141
+ "description": "The IDPS must be designed and configured to isolate security functions isolate security functions from non-security functions. An isolation boundary is implemented via partitions and domains. This boundary must provide separation between processes having different security levels. These processes are used by the hardware, software, and firmware of the IDPS components to perform various functions. The IDPS application must maintain a separate execution domain (e.g., address space) for each executing process to minimize the risk of leakage or corruption of privileged information. \nThis control is normally a function of the IDPS application design and is usually not a configurable setting; however, if there may be settings in some IDPS applications that must be configured to optimize function isolation.",
1142
+ "severity": "medium"
1143
+ },
1144
+ {
1145
+ "id": "SRG-NET-000186-IDPS-000197",
1146
+ "title": "The IDPS must isolate security functions used to enforce access and information flow control from both non-security functions and from other security functions.",
1147
+ "description": "The IDPS must be designed and configured to isolate security functions enforcing access and information flow control. Isolation must separate processes that perform security functions from those performing non-security. An isolation boundary is implemented via partitions and domains. This boundary must provide access control and integrity protection of the hardware, software, and firmware of the IDPS components. The IDPS application must maintain a separate execution domain (e.g., address space) for each executing process to minimize the risk of leakage or corruption of privileged information. This control is normally a function of the IDPS application design and is usually not a configurable setting; however, if there may be settings in some IDPS applications that must be configured to optimize function isolation.",
1148
+ "severity": "medium"
1149
+ },
1150
+ {
1151
+ "id": "SRG-NET-000187-IDPS-000198",
1152
+ "title": "The IDPS must implement an isolation boundary to minimize the number of non-security functions included within the boundary containing security functions.",
1153
+ "description": "The IDPS must be designed and configured to minimize the number of non-security functions included within the boundary containing security functions. An isolation boundary, implemented via partitions and domains, must be used to minimize the mixture of these functions, thus minimizing the risk of leakage or corruption of privileged information. \nThis control is normally a function of the IDPS application design and is usually not a configurable setting; however, in some applications, there may be settings that must be configured to optimize function isolation.",
1154
+ "severity": "medium"
1155
+ },
1156
+ {
1157
+ "id": "SRG-NET-000189-IDPS-000199",
1158
+ "title": "The IDPS must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.",
1159
+ "description": "The IDPS must be designed and configured to implement security functions as a layered structure. An isolation boundary, using separate partitions and domains, must be used to minimize interactions between layers of the design. The lower layers of the design should not depend upon the upper layers. If one layer experiences an error in functionality or security, this should not impact the function of the remaining layers. This layered design minimizes the risk of leakage or corruption of privileged information. \nThis control is normally a function of the IDPS application design and is usually not a configurable setting; however, in some applications, there may be settings that must be configured to optimize function isolation.",
1160
+ "severity": "medium"
1161
+ },
1162
+ {
1163
+ "id": "SRG-NET-000190-IDPS-000201",
1164
+ "title": "The IDPS must prevent unauthorized and unintended information transfer via shared system resources.",
1165
+ "description": "The purpose of this control is to prevent information produced by the actions of a prior user, role, or the actions of a process acting on behalf of a prior user/role from being available to any current user, role, or current process obtaining access to a shared system resource (e.g., registers, main memory, secondary storage) after the resource has been released back to the IDPS. Control of information in shared resources is also referred to as object reuse.",
1166
+ "severity": "medium"
1167
+ },
1168
+ {
1169
+ "id": "SRG-NET-000191-IDPS-NA",
1170
+ "title": "The IDPS must protect against or limits the effects of Denial of Service (DoS) attacks.",
1171
+ "description": "An IDPS experiencing a DoS attack will not be able to handle production traffic load. The high utilization and CPU caused by a DoS attack will also have an effect on control keep-alives and timers used for neighbor peering resulting in route flapping and eventually black hole production traffic. \nThe device must be configured to thwart, counter, or prevent such attacks. HIDS is not within the scope of this document.",
1172
+ "severity": "medium"
1173
+ },
1174
+ {
1175
+ "id": "SRG-NET-000192-IDPS-NA",
1176
+ "title": "The IDPS must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks.",
1177
+ "description": "An IDPS experiencing a DoS attack will not be able to handle the production traffic load. The high utilization and CPU caused by a DoS attack will also have an effect on control keep-alives and timers used for neighbor peering resulting in route flapping and eventually black hole production traffic. \nThe device must be configured to block such attacks. HIDS is not within the scope of this document.",
1178
+ "severity": "medium"
1179
+ },
1180
+ {
1181
+ "id": "SRG-NET-000193-IDPS-NA",
1182
+ "title": "The IDPS must manage excess bandwidth to limit the effects of packet flooding types of Denial of Service (DoS) attacks.",
1183
+ "description": "An IDPS experiencing a DoS attack will not be able to handle production traffic load. The high utilization and CPU caused by a DoS attack will also have an effect on control keep-alives and timers used for neighbor peering resulting in route flapping and eventually black hole production traffic. The device must be configured to contain and limit a DoS attack's effect on the device's resource utilization. \nHIDS is not within the scope of this document.",
1184
+ "severity": "medium"
1185
+ },
1186
+ {
1187
+ "id": "SRG-NET-000194-IDPS-000202",
1188
+ "title": "The IDPS must limit and reserve bandwidth based on the priority of the traffic type.",
1189
+ "description": "Different applications have unique requirements and tolerance levels for delay, jitter, bandwidth, packet loss, and availability. To manage the multitude of applications and services, a network requires a QoS framework. This framework differentiates traffic types and provides a method of avoiding and managing network congestion. A QoS implementation categorizes network traffic into classes and provides priority treatment based on the classification. If QoS is not implemented, network congestion occurs causing poor network service because all traffic has an equal chance of being dropped. \nAn additional IDPS component, a load balancer, is recommended for use with larger networks.",
1190
+ "severity": "medium"
1191
+ },
1192
+ {
1193
+ "id": "SRG-NET-000195-IDPS-000203",
1194
+ "title": "The IPS must check inbound traffic to ensure that the communications are coming from an authorized source and routed to an authorized destination.",
1195
+ "description": "Spoofing source addresses occurs when a malicious user outside the network has created packets with source address belonging to the private address space of the target network. This is done in an attempt to slip through perimeter as a member host to gain access to internal resources or to conceal identity to perform an attack. It is imperative that all inbound and outbound traffic with spoofed or invalid source addresses are blocked. If inbound traffic is not monitored to make sure source and destination of packets are authorized, then malicious users outside the network may be able to send packets to the private, trusted network.",
1196
+ "severity": "medium"
1197
+ },
1198
+ {
1199
+ "id": "SRG-NET-000196-IDPS-NA",
1200
+ "title": "The IDPS must implement host-based boundary protection mechanisms.",
1201
+ "description": "The network element, dependent on the underlying operating system, is at greater risk due to software vulnerabilities and access capabilities. It is critical these devices have host-based IDS and firewalls installed and implemented to provide additional security for the network component.",
1202
+ "severity": "medium"
1203
+ },
1204
+ {
1205
+ "id": "SRG-NET-000197-IDPS-NA",
1206
+ "title": "The IDPS must isolate organizationally defined key information security tools, mechanisms, and support components from other internal information system components via physically separate subnets.",
1207
+ "description": "To secure the enclave, the site must implement defense-in-depth security. This requires the deployment of various network security elements at strategic locations. The enclave must also be segregated into separate subnets with unique security policies. Subnetting provides a number of essential network services (e.g., public content, remote access, perimeter protection). If isolation techniques such as subnetting are not used, unauthorized access to privileged information could result.",
1208
+ "severity": "medium"
1209
+ },
1210
+ {
1211
+ "id": "SRG-NET-000198-IDPS-000205",
1212
+ "title": "The IDPS must receive all management traffic through a dedicated management interface.",
1213
+ "description": "Implementing out of band (OOB) management for the IDPS is the first step in the deployment of a management network. OOBM networks isolate network users from communication channels dedicated to network management; thereby providing traffic separation that will increase security for all network management activities. The management network should have a direct connection to the management interface of the sensors and management console. Where this is not possible, the OOB management traffic can traverse over a transient IP backbone via private encrypted tunnel. Regardless of transport, all management traffic received by the managed IDPS must be received by a dedicated management interface connected to the OOBM network. If management traffic is allowed onto the user network segments, privileged information may be intercepted by non-privileged users which could lead to the compromise of network devices.\nIDPS sensors are installed in stealth mode with one interface installed on the management network. This interface is used for communications with the management console and other network elements. The management console is installed on the management network.",
1214
+ "severity": "medium"
1215
+ },
1216
+ {
1217
+ "id": "SRG-NET-000199-IDPS-000206",
1218
+ "title": "The IDPS must prevent discovery of specific system components or devices comprising a managed interface.",
1219
+ "description": "Allowing neighbor discovery messages to reach external network nodes is dangerous as it provides an attacker a method to obtain information of the network infrastructure that can be useful to plan an attack. In addition, responding to the sending node that a packet cannot be forwarded as the destination host is unreachable provides network mapping information. Furthermore, if a router receives a large number of packets that cannot be forwarded, the router processor could be overloaded if it must generate a high volume of unreachable messages. To mitigate the risk of reconnaissance or a Denial of Service (DoS) attack, all external-facing interfaces must be configured to silently drop unreachable traffic, not announce network address information, and to ignore neighbor solicitation messages.\nIDPS sensors are installed in stealth mode with one interface installed on the management network. This interface is used for communications with the management console and other network elements. The management console is installed on the management network.",
1220
+ "severity": "medium"
1221
+ },
1222
+ {
1223
+ "id": "SRG-NET-000200-IDPS-000207",
1224
+ "title": "The IPS must enforce strict adherence to protocol format.",
1225
+ "description": "Crafted packets not conforming to Institute of Electrical and Electronics Engineers (IEEE) standards can be used by malicious people to exploit a host's protocol stack to create a Denial of Service (DoS) or force a device reset, bypass security gateway filtering, or compromise a vulnerable device. It is imperative these packets are recognized and discarded at the network perimeter.",
1226
+ "severity": "medium"
1227
+ },
1228
+ {
1229
+ "id": "SRG-NET-000201-IDPS-000208",
1230
+ "title": "The IPS must prevent access into the organization's internal networks except as explicitly permitted and controlled by employing boundary protection devices.",
1231
+ "description": "The enclave's internal network contains the servers where mission critical data and applications reside. There should never be connection attempts made to these devices from any host outside of the enclave. The initial defense for the internal network is to block any traffic at the perimeter attempting to make a connection to a host residing on the internal network.",
1232
+ "severity": "medium"
1233
+ },
1234
+ {
1235
+ "id": "SRG-NET-000202-IDPS-NA",
1236
+ "title": "The IPS must deny network traffic by default and allow network traffic by exception at all interfaces at the network perimeter.",
1237
+ "description": "All inbound and outbound traffic must be denied by default. Firewalls and perimeter routers should only allow traffic through that is explicitly permitted. The initial defense for the internal network is to block any traffic at the perimeter that is attempting to make a connection to a host residing on the internal network. In addition, allowing unknown or undesirable outbound traffic by the firewall or router will establish state that will subsequently permit the return of this undesirable traffic inbound.",
1238
+ "severity": "medium"
1239
+ },
1240
+ {
1241
+ "id": "SRG-NET-000203-IDPS-NA",
1242
+ "title": "The network element must route organizationally defined internal communications traffic to organizationally defined external networks through authenticated proxy servers within the managed interfaces of boundary protection devices.",
1243
+ "description": "A proxy server is designed to hide the identity of the client when making a connection to a server on the outside of its network such as web server, web mail, and chat rooms. This prevents any hackers on the outside of learning IP addresses within the private network. With a proxy acting as the mediator, the client does not interact directly with the servers it is connecting to-the proxy server is in the middle handling both sides of the session. Hence, all routing devices must forward traffic to the appropriate proxy to filter the traffic and initiate the sessions with the external server.",
1244
+ "severity": "medium"
1245
+ },
1246
+ {
1247
+ "id": "SRG-NET-000204-IDPS-000209",
1248
+ "title": "The IPS must monitor and enforce filtering of internal addresses posing a threat to external information systems.",
1249
+ "description": "Monitoring and filtering the outbound traffic adds a layer of protection to the enclave. \nUnlike an IDS, an IPS can both detect and take action to prevent harmful traffic from leaving the network. Blocking harmful outbound traffic can also prevent the network from being used as the source of an attack.",
1250
+ "severity": "medium"
1251
+ },
1252
+ {
1253
+ "id": "SRG-NET-000205-IDPS-000210",
1254
+ "title": "The IPS must monitor and control traffic at both the external and internal boundary interfaces.",
1255
+ "description": "Monitoring and controlling both inbound and outbound and inbound network traffic adds a layer of protection to the enclave. Unlike an IDS, an IPS can both detect and take action to prevent harmful traffic from leaving the network. Blocking harmful inbound and outbound traffic can also prevent the network from being used as the source of an attack.",
1256
+ "severity": "medium"
1257
+ },
1258
+ {
1259
+ "id": "SRG-NET-000206-IDPS-NA",
1260
+ "title": "The network element must connect to external networks only through managed interfaces consisting of boundary protection devices arranged in accordance with organizational security architecture.",
1261
+ "description": "The firewall will build a state to allow return traffic for all initiated traffic that was allowed outbound. Monitoring and filtering the outbound traffic adds a layer of protection to the enclave, in addition to being a good Internet citizen by preventing your network from being used as an attack base. All network elements must be configured to ensure all traffic is forwarded through the perimeter security infrastructure when sending traffic to external destinations.",
1262
+ "severity": "medium"
1263
+ },
1264
+ {
1265
+ "id": "SRG-NET-000207-IDPS-000213",
1266
+ "title": "The IDPS must protect the integrity of transmitted information.",
1267
+ "description": "The IDPS must employ cryptographic mechanisms to recognize changes to information during transmission unless the transmission is otherwise protected by alternative physical measures. If connectivity is provided by a commercial service provider rather than a dedicated service, obtaining the necessary assurances regarding the implementation of needed security controls for transmission integrity may not be possible. Without cryptographic integrity controls, information traveling over commercial networks could be altered or compromised during transmission. Therefore, these controls must be obtained from the service provider using appropriate contracting vehicles. If this is not feasible, then the organization will implement physical or logical compensating security controls.",
1268
+ "severity": "medium"
1269
+ },
1270
+ {
1271
+ "id": "SRG-NET-000208-IDPS-000211",
1272
+ "title": "The IDPS must use cryptographic mechanisms to protect the integrity of information while in transit.",
1273
+ "description": "This control applies to communications across internal and external networks, unless the information is protected by a physical security solution (e.g., Protective Distribution System [PDS] or physical access control) while in transit. The IDPS must employ cryptographic mechanisms to recognize changes to information during transmission unless the transmission is otherwise protected by alternative physical measures. If connectivity is provided by a commercial service provider rather than a dedicated service, obtaining the necessary assurances regarding the implementation of needed security controls for transmission integrity may not be possible. Without cryptographic integrity controls, information traveling over commercial networks could be altered or compromised during transmission. Therefore, these controls must be obtained from the service provider using appropriate contracting vehicles. If this is not feasible, then the organization will implement physical or logical compensating security controls.",
1274
+ "severity": "medium"
1275
+ },
1276
+ {
1277
+ "id": "SRG-NET-000209-IDPS-000212",
1278
+ "title": "The IDPS must maintain the integrity of information during aggregation and encapsulation in preparation for transmission.",
1279
+ "description": "This control applies to communications across internal and external networks. The IDPS must employ cryptographic mechanisms to recognize changes to information while preparing information for transmission unless the transmission is otherwise protected by alternative physical measures. If connectivity is provided by a commercial service provider rather than a dedicated service, obtaining the necessary assurances regarding the implementation of needed security controls for transmission integrity may not be possible. Without cryptographic integrity controls, information traveling over commercial networks could be altered or compromised during transmission. Therefore, these controls must be obtained from the service provider using appropriate contracting vehicles. If this is not feasible, then the organization will implement physical or logical compensating security controls. The IDPS does not provide transmission service integrity protections over commercial lines.",
1280
+ "severity": "medium"
1281
+ },
1282
+ {
1283
+ "id": "SRG-NET-000210-IDPS-000215",
1284
+ "title": "The IDPS must protect the confidentiality of transmitted information.",
1285
+ "description": "If the organization is relying on a commercial service provider for transmission services as a commodity item rather than a fully dedicated service for both internal and external connectivity, it may be more difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality. When it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk.",
1286
+ "severity": "medium"
1287
+ },
1288
+ {
1289
+ "id": "SRG-NET-000211-IDPS-000214",
1290
+ "title": "The IDPS must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.",
1291
+ "description": "If the organization is relying on a commercial service provider for transmission services as a commodity item rather than a fully dedicated service for both internal and external connectivity, it may be more difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality. When it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk.",
1292
+ "severity": "medium"
1293
+ },
1294
+ {
1295
+ "id": "SRG-NET-000212-IDPS-NA",
1296
+ "title": "The IDPS must maintain the confidentiality of information during aggregation and encapsulation in preparation for transmission.",
1297
+ "description": "If the organization is relying on a commercial service provider for transmission services as a commodity item rather than a fully dedicated service for both internal and external connectivity, it may be more difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality. When it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk.",
1298
+ "severity": "medium"
1299
+ },
1300
+ {
1301
+ "id": "SRG-NET-000213-IDPS-000171",
1302
+ "title": "The IDPS must terminate the connection associated with a communications session at the end of the session or after an organizationally defined time period of inactivity.",
1303
+ "description": "Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled between the managed IDPS and a PC or terminal server when the latter has been left unattended. In addition quickly terminating an idle session will also free up resources committed by the managed IDPS as well as reduce the risk of a management session from being hijacked.",
1304
+ "severity": "medium"
1305
+ },
1306
+ {
1307
+ "id": "SRG-NET-000214-IDPS-000172",
1308
+ "title": "The IDPS must establish a trusted communications path between the user and organizationally defined security functions within the information system.",
1309
+ "description": "To safeguard critical information that could be used by a malicious user to compromise the device or the entire network infrastructure, a trusted path is required for high-confidence connections between the security functions (i.e., login) of the IDPS and the user.",
1310
+ "severity": "medium"
1311
+ },
1312
+ {
1313
+ "id": "SRG-NET-000215-IDPS-NA",
1314
+ "title": "The IDPS must produce, control, and distribute symmetric cryptographic keys using NIST-approved or NSA-approved key management technology and processes.",
1315
+ "description": "The escalating use of cryptography has brought forth a huge challenge for organizations to protect and manage the hundreds and even thousands of cryptographic keys employed during daily cryptographic transactions. The most secure algorithm is rendered useless if the keys cannot be kept secured. Left unprotected keys are vulnerable to duplication or modification. Duplication enables an attacker to copy a key to be used for access to the service and steal information. An attacker will modify or corrupt a key to cause a Denial of Service. The secure administration and distribution of cryptographic keys is a necessary and critical aspect of risk mitigation. Key management is the process of generating and securely distributing keys used in the encryption process. It is the practice of implementing a security key management policy to protect cryptographic operations from compromise and abuse. The policy must include key generation, distribution, storage, usage, lifetime duration, and destruction. Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. In addition to being required for the effective operation of a cryptographic mechanism, effective cryptographic key management provides protection to maintain the availability of the information in the event of the loss of cryptographic keys by users.",
1316
+ "severity": "medium"
1317
+ },
1318
+ {
1319
+ "id": "SRG-NET-000216-IDPS-NA",
1320
+ "title": "The IDPS must produce, control, and distribute symmetric and asymmetric cryptographic keys using NSA-approved key management technology and processes.",
1321
+ "description": "The escalating use of cryptography has brought forth a huge challenge for organizations to protect and manage the hundreds and even thousands of cryptographic keys employed during daily cryptographic transactions. The most secure algorithm is rendered useless if the keys cannot be kept secured. Left unprotected keys are vulnerable to duplication or modification. Duplication enables an attacker to copy a key to be used for access to the service and steal information. An attacker will modify or corrupt a key to cause a Denial-of-Service. The secure administration and distribution of cryptographic keys is a necessary and critical aspect of risk mitigation. Key management is the process of generating and securely distributing keys used in the encryption process. It is the practice of implementing a security key management policy to protect cryptographic operations from compromise and abuse. The policy must include key generation, distribution, storage, usage, lifetime duration, and destruction. Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. In addition to being required for the effective operation of a cryptographic mechanism, effective cryptographic key management provides protection to maintain the availability of the information in the event of the loss of cryptographic keys by users.",
1322
+ "severity": "medium"
1323
+ },
1324
+ {
1325
+ "id": "SRG-NET-000217-IDPS-NA",
1326
+ "title": "The IDPS must produce, control, and distribute asymmetric cryptographic keys using approved PKI Class 3 certificates or prepositioned keying material.",
1327
+ "description": "The escalating use of cryptography has brought forth a huge challenge for organizations to protect and manage the hundreds and even thousands of cryptographic keys employed during daily cryptographic transactions. The most secure algorithm is rendered useless if the keys cannot be kept secured. Left unprotected keys are vulnerable to duplication or modification. Duplication enables an attacker to copy a key to be used for access to the service and steal information. An attacker will modify or corrupt a key to cause a Denial-of-Service. The secure administration and distribution of cryptographic keys is a necessary and critical aspect of risk mitigation. Key management is the process of generating and securely distributing keys used in the encryption process. It is the practice of implementing a security key management policy to protect cryptographic operations from compromise and abuse. The policy must include key generation, distribution, storage, usage, lifetime duration, and destruction. Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. In addition to being required for the effective operation of a cryptographic mechanism, effective cryptographic key management provides protections to maintain the availability of the information in the event of the loss of cryptographic keys by users.",
1328
+ "severity": "medium"
1329
+ },
1330
+ {
1331
+ "id": "SRG-NET-000218-IDPS-NA",
1332
+ "title": "The IDPS must produce, control, and distribute asymmetric cryptographic keys using approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user's private key.",
1333
+ "description": "The escalating use of cryptography has brought forth a huge challenge for organizations to protect and manage the hundreds and even thousands of cryptographic keys employed during daily cryptographic transactions. The most secure algorithm is rendered useless if the keys cannot be kept secured. Left unprotected keys are vulnerable to duplication or modification. Duplication enables an attacker to copy a key to be used for access to the service and steal information. An attacker will modify or corrupt a key to cause a Denial-of-Service. The secure administration and distribution of cryptographic keys is a necessary and critical aspect of risk mitigation. Key management is the process of generating and securely distributing keys used in the encryption process. It is the practice of implementing a security key management policy to protect cryptographic operations from compromise and abuse. The policy must include key generation, distribution, storage, usage, lifetime duration, and destruction. Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. In addition to being required for the effective operation of a cryptographic mechanism, effective cryptographic key management provides protections to maintain the availability of the information in the event of the loss of cryptographic keys by users.",
1334
+ "severity": "medium"
1335
+ },
1336
+ {
1337
+ "id": "SRG-NET-000219-IDPS-000176",
1338
+ "title": "The IDPS must employ cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.",
1339
+ "description": "It is imperative the authentication process and the transmission of network management traffic implements cryptographic modules adhering to the standards approved by the federal government. If approved encryption and/or hashing methods are not used during the authentication process, malicious users can gain knowledge of passwords and other configuration information by sniffing IDPS traffic on the network.\nFIPS-validated or NSA-approved cryptographic modules must be used by the IDPS whenever cryptographic protection is required.",
1340
+ "severity": "medium"
1341
+ },
1342
+ {
1343
+ "id": "SRG-NET-000219-IDPS-000177",
1344
+ "title": "IDPS auxiliary port(s) must be disabled if not approved for use.",
1345
+ "description": "IDS and IPS devices may have auxiliary port(s) which can be configured for local or non-local (remote) access to management functions and diagnostics. This is not a recommended practice since it bypasses the network infrastructure and depends on authentication provided by the device itself. Use of directly attached modems risks sending management communications over commercial circuits and the risk of war-dialing attacks on the device could degrade the device and the production network. Where auxiliary ports are used for remote access, both the modem and the port must be configured to use authentication and encrypted communications.",
1346
+ "severity": "medium"
1347
+ },
1348
+ {
1349
+ "id": "SRG-NET-000219-IDPS-000178",
1350
+ "title": "Modems used for remote access to the IDPS, must be able to authenticate users using two-factor authentication.",
1351
+ "description": "IDPS management consoles may have auxiliary port(s) which can be configured for local or non-local (remote) access to management functions and diagnostics. This is not a recommended practice since it bypasses the network infrastructure since it often relies upon authentication and access control provided by the device itself. Use of directly attached modems without authentication risks the compromise of privileged communications over commercial circuits. However, there may be use cases where this type of access is mission essential. Modems may be attached to auxiliary ports only if they are secured using two-factor authentication. System administrators must be authenticated using a hardware token (e.g., key fob) and granted access to the appropriate maintenance port, thus the technician will gain access to the system. The token provides a method of strong (two-factor) user authentication. The token works in conjunction with a server to generate one-time user passwords that will change values at second intervals. The user must know a personal identification number (PIN) and possess the token to be allowed access to the device.",
1352
+ "severity": "high"
1353
+ },
1354
+ {
1355
+ "id": "SRG-NET-000220-IDPS-000173",
1356
+ "title": "The IDPS must employ FIPS-validated cryptography to protect unclassified information.",
1357
+ "description": "Cryptography is only as strong as the encryption modules/algorithms that are employed to encrypt the data. Use of weak or un-tested encryption algorithms undermines the purposes of utilizing encryption to protect data. Hence it is imperative that transmission of traffic that requires privacy utilize FIPS-validated cryptography. Traffic between the management console, sensor, and/or other network elements must be protected by cryptographic mechanisms.",
1358
+ "severity": "medium"
1359
+ },
1360
+ {
1361
+ "id": "SRG-NET-000221-IDPS-000170",
1362
+ "title": "The IDPS must employ NSA-approved cryptography to protect classified information.",
1363
+ "description": "Whether a network is being managed locally or from a Network Operations Center (NOC), achieving network management objectives depends on comprehensive and reliable network management solutions. To protect the integrity and confidentiality of non-local maintenance and diagnostics, all packets associated with these sessions must be encrypted. During the authentication process, malicious users can gain knowledge of passwords during authentication process by sniffing local traffic between the IDPS and the authentication server. It is imperative the authentication process and the transmission of network management traffic implements NSA-approved cryptography.",
1364
+ "severity": "medium"
1365
+ },
1366
+ {
1367
+ "id": "SRG-NET-000222-IDPS-000174",
1368
+ "title": "The IDPS must employ FIPS-validated cryptography to protect information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.",
1369
+ "description": "Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or un-tested encryption algorithms undermines the purposes of utilizing encryption to protect data. FIPS-validated cryptography must be used to protect information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals. \nTraffic between the management console, sensor, and/or other network elements must be protected by cryptographic mechanisms.",
1370
+ "severity": "medium"
1371
+ },
1372
+ {
1373
+ "id": "SRG-NET-000224-IDPS-000179",
1374
+ "title": "The IDPS must protect the integrity and availability of publicly available information and applications.",
1375
+ "description": "Public-facing servers enable access to information by clients outside of the enclave. These servers are subject to greater exposure to attacks. It is imperative that the integrity of the data is maintained to ensure the enclave does not provide false or erroneous information. The IDPS must provide the necessary protection to ensure availability and integrity of the data and to reduce or eliminate Denial-of-Service (DoS) attacks directed against the servers on the public-facing segment. A sensor must be installed to monitor and scan the publicly available segment (e.g., public DMZ).",
1376
+ "severity": "medium"
1377
+ },
1378
+ {
1379
+ "id": "SRG-NET-000225-IDPS-000181",
1380
+ "title": "The IDPS must associate security attributes with information exchanged between information systems.",
1381
+ "description": "Security attributes are associated with internal structures within the IDPS application used to enable the implementation of access control and flow control policies or support other aspects of the information security policy. It is crucial these attributes are associated and validated to ensure access control and flow control policies are properly implemented. \nThe IDPS communicates with other systems to transmit notices and sensor logs or to update other network elements (e.g., IPS updating the router or firewall ACLs).",
1382
+ "severity": "medium"
1383
+ },
1384
+ {
1385
+ "id": "SRG-NET-000226-IDPS-000180",
1386
+ "title": "The IDPS must validate the integrity of security attributes exchanged between information systems.",
1387
+ "description": "Security attributes are associated with internal structures within the IDPS used to enable the implementation of access control and flow control policies or support other aspects of the information security policy. It is crucial these attributes are associated and validated to ensure access control and flow control policies are properly implemented. \nThe IDPS communicates with other systems to transmit notices and sensor logs or to update other network elements (e.g., IPS updating the router or firewall ACLs).",
1388
+ "severity": "medium"
1389
+ },
1390
+ {
1391
+ "id": "SRG-NET-000227-IDPS-NA",
1392
+ "title": "The IDPS must issue public key certificates under an appropriate certificate policy or obtain public key certificates under an appropriate certificate policy from an approved service provider.",
1393
+ "description": "For user certificates, each organization attains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority will suffice. This requirement focuses on certificates with a visibility external to the information system and does not include certificates related to internal system operations, application-specific time services.",
1394
+ "severity": "medium"
1395
+ },
1396
+ {
1397
+ "id": "SRG-NET-000228-IDPS-000183",
1398
+ "title": "The IDPS must implement detection and inspection mechanisms to identify unauthorized mobile code.",
1399
+ "description": "The mobile code paradigm encompasses programs that can be executed on one or several hosts other than the one they originate from. Mobility of such programs implies some built-in capability for each piece of code to travel smoothly from one host to another. Mobile code systems range from simple applets to intelligent software agents. These systems offer several advantages over the more traditional distributed computing approach. However, mobile code introduces risk to the IT infrastructure. Malicious mobile code is a vehicle to remotely install malware on a computer. This type of code can be transmitted through interactive Web applications such as ActiveX controls, Flash animation, or JavaScript. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. This code must be detected before it infiltrates the enclave.",
1400
+ "severity": "medium"
1401
+ },
1402
+ {
1403
+ "id": "SRG-NET-000229-IDPS-000182",
1404
+ "title": "The IDPS must take corrective action when unauthorized mobile code is identified.",
1405
+ "description": "The mobile code paradigm encompasses programs that can be executed on one or several hosts other than the one they originate from. Mobility of such programs implies some built-in capability for each piece of code to travel smoothly from one host to another. Mobile code systems range from simple applets to intelligent software agents. These systems offer several advantages over the more traditional distributed computing approach. However, mobile code introduces risk to the IT infrastructure. Malicious mobile code is a vehicle to remotely install malware on a computer. This type of code can be transmitted through interactive Web applications such as ActiveX controls, Flash animation, or JavaScript. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. This code must be detected before it infiltrates the enclave. When detected, the IDPS must log and drop the traffic containing the mobile code.",
1406
+ "severity": "medium"
1407
+ },
1408
+ {
1409
+ "id": "SRG-NET-000230-IDPS-000187",
1410
+ "title": "The IDPS must provide mechanisms to protect the authenticity of communications sessions.",
1411
+ "description": "Peering neighbors must have a level of trust with each other since information being shared is used to provide network services, connectivity, and optimized routing. Corrupted or erroneous information shared between the IDPS can disrupt network operations by creating non-optimized forwarding of traffic and network outages. Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the IDPS authenticates the source involved in sending the information.",
1412
+ "severity": "low"
1413
+ },
1414
+ {
1415
+ "id": "SRG-NET-000231-IDPS-000188",
1416
+ "title": "The IDPS must invalidate session identifiers upon user logout or other session termination.",
1417
+ "description": "Peering neighbors must have a level of trust with each other since information being shared is used to provide network services, connectivity, and optimized routing. Corrupted or erroneous information shared between the IDPS can disrupt network operations by creating non-optimized forwarding of traffic and network outages. Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the IDPS authenticates the source involved in sending the information. Unique session identifier must also be used to reduce the risk of session hi-jacking. These session identifiers must be released and invalidated upon user logout or session termination to prevent exploitation by attackers.",
1418
+ "severity": "medium"
1419
+ },
1420
+ {
1421
+ "id": "SRG-NET-000232-IDPS-000189",
1422
+ "title": "The IDPS must generate a unique session identifier for each session.",
1423
+ "description": "Peering neighbors must have a level of trust with each other since information being shared is used to provide network services, connectivity, and optimized routing. Corrupted or erroneous information shared between the IDPS can disrupt network operations by creating non-optimized forwarding of traffic and network outages. Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. \nMeans to enforce this enhancement include ensuring the IDPS authenticates the source involved in sending the information. IDPS generated, unique session identifier must also be used to reduce the risk of session hi-jacking.",
1424
+ "severity": "medium"
1425
+ },
1426
+ {
1427
+ "id": "SRG-NET-000233-IDPS-000190",
1428
+ "title": "The IDPS must allow only system generated session identifiers.",
1429
+ "description": "Peering neighbors must have a level of trust with each other since information being shared is used to provide network services, connectivity, and optimized routing. Corrupted or erroneous information shared between the IDPS can disrupt network operations by creating non-optimized forwarding of traffic and network outages. Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the IDPS authenticates the source involved in sending the information. IDPS generated, unique session identifier must also be used to reduce the risk of session hi-jacking.",
1430
+ "severity": "medium"
1431
+ },
1432
+ {
1433
+ "id": "SRG-NET-000234-IDPS-000191",
1434
+ "title": "The IDPS must generate unique session identifiers with organizationally defined randomness requirements.",
1435
+ "description": "Peering neighbors must have a level of trust with each other since information being shared is used to provide network services, connectivity, and optimized routing. Corrupted or erroneous information shared between the IDPS can disrupt network operations by creating non-optimized forwarding of traffic and network outages. Identifying source and destination addresses for information flows within the network allows forensic reconstruction of events when required, and increases policy compliance by attributing policy violations to specific individuals. Means to enforce this enhancement include ensuring the IDPS authenticates the source involved in sending the information. IDPS generated, unique session identifier must also be used to reduce the risk of session hi-jacking. The greater the randomization of the session identifier, the more difficult to guess or anticipate.",
1436
+ "severity": "medium"
1437
+ },
1438
+ {
1439
+ "id": "SRG-NET-000235-IDPS-000193",
1440
+ "title": "The IDPS must fail to an organizationally defined known-state for organizationally defined types of failures.",
1441
+ "description": "Failure in a known state can address safety or security in accordance with the mission needs of the organization. Failure to a state that is known to be secure helps prevent the loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system.",
1442
+ "severity": "low"
1443
+ },
1444
+ {
1445
+ "id": "SRG-NET-000236-IDPS-000192",
1446
+ "title": "The IDPS must preserve organizationally defined system state information in the event of a system failure.",
1447
+ "description": "Failure in a known state can address safety or security in accordance with the mission needs of the organization. Failure in a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system. Preserving system state information facilitates system restart and return to the operational mode of the organization with less disruption of the network. Site should have a failover solution in place in case of system fault. IDPS systems may include failover configuration using multiple management servers, logging databases, and sensor load balancers.",
1448
+ "severity": "low"
1449
+ },
1450
+ {
1451
+ "id": "SRG-NET-000237-IDPS-000194",
1452
+ "title": "The IDPS must implement signatures that detect specific attacks and protocols that should not be seen on the segments containing web servers.",
1453
+ "description": "In the Regional Enterprise Enclave different sets of sensors will see different traffic as a result of their location within the regional enclave. By establishing separate signature profiles for each set of sensors, each profile can then be tuned to generate alarms based on the traffic types seen, the attack signatures, and the specific traffic (string signatures) relevant to each sensor group. If more than one sensor group sees the same traffic types, then the same signature profile may be used for both sets. Alerting on specific connection signatures, general attack signatures, and specific string signatures provides focused segment analysis at Layers 4. \nThe sensor monitoring the web server will be configured for application inspection and control of all web ports (e.g. 80, 3128, 8000, 8010, 8080, 8888, 24326, etc.). The sensor monitoring the web servers must monitor and control web traffic not received on web ports. This process is called port redirection. In many implementations port redirection is a separate signature to be installed.",
1454
+ "severity": "medium"
1455
+ },
1456
+ {
1457
+ "id": "SRG-NET-000238-IDPS-000196",
1458
+ "title": "The IDPS must protect the confidentiality and integrity of system information at rest.",
1459
+ "description": "This control is intended to address the confidentiality and integrity of system information at rest when it is located on a secondary storage device within the IDPS. It is imperative that system data that is generated as well as device configuration data is protected.",
1460
+ "severity": "low"
1461
+ },
1462
+ {
1463
+ "id": "SRG-NET-000239-IDPS-000195",
1464
+ "title": "The IDPS must employ cryptographic mechanisms to prevent unauthorized disclosure of information at rest unless otherwise protected by alternative physical measures.",
1465
+ "description": "This control is intended to address the confidentiality and integrity of system information at rest when it is located on a secondary storage device within the IDPS. It is imperative that system data that is generated as well as device configuration data is protected.",
1466
+ "severity": "medium"
1467
+ },
1468
+ {
1469
+ "id": "SRG-NET-000241-IDPS-NA",
1470
+ "title": "The IDPS must protect the integrity of information during the processes of data aggregation, packaging, and transformation in preparation for transmission.",
1471
+ "description": "Information can be subjected to unauthorized changes (e.g., malicious or unintentional modification) at information aggregation or protocol transformation points.\nThis control is covered as part of the OS SRG and implemented by configuration of a HIDS.",
1472
+ "severity": "medium"
1473
+ },
1474
+ {
1475
+ "id": "SRG-NET-000242-IDPS-000219",
1476
+ "title": "The IDPS must be configured to automatically check for security updates to the application software on an organizationally defined frequency.",
1477
+ "description": "It is imperative that the activity promptly installs security-relevant software updates to mitigate the risk of new vulnerabilities. Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling, are also addressed expeditiously. By requiring the automated update of application software on a periodic schedule, flaws and newly discovered attack vendors will be remediated in a timely manner.",
1478
+ "severity": "low"
1479
+ },
1480
+ {
1481
+ "id": "SRG-NET-000242-IDPS-000220",
1482
+ "title": "The IDPS must use a vendor-supported version of the firmware and application software.",
1483
+ "description": "The system administrator must monitor IAVM, OS, or OEM patch or vulnerability notices.\nSoftware flaw remediation and tracking is ideally performed by a patch management/remediation server. Depending on the IDPS used, this requirement can be accomplished by configuring the device to work with the remediation server. However, it is also acceptable if the remediation server is configured to fulfill this requirement and notify the administrator when updates are required.\nIt is not recommended for the IDPS to directly connect to the vendor or any other external site. A patch management server must be used as the source of software updates. Unsupported versions will lack security enhancements as well as support provided by the vendors to address vulnerabilities.",
1484
+ "severity": "low"
1485
+ },
1486
+ {
1487
+ "id": "SRG-NET-000242-IDPS-000221",
1488
+ "title": "The IDPS must use SNMP Version 3 (SNMPv3) Security Model with FIPS 140-2 compliant cryptography (i.e., SHA authentication and AES encryption).",
1489
+ "description": "SNMP Versions 1 and 2 are not considered secure. Without the strong authentication and privacy that is provided by the SNMP Version 3 User-based Security Model (USM), an attacker or other unauthorized user may gain access to detailed network management information and use that information to launch attacks against the network.\n\nTo verify the appropriate patches on CISCO devices check the following IAVMs associated with SNMPv1: 2001-B-0001 (V0005809 ) Cisco IOS Software SNMP Read-Write ILMI Community String Vulnerability 2002-A-SNMP-001 (V0005835) Multiple Simple Network Management Protocol Vulnerabilities in Perimeter Devices (Cisco Security Advisory: Malformed SNMP Message-Handling Vulnerabilities)\n\nTo verify the appropriate patches on other vendors, reference this web site: http://www.cert.org/advisories/CA-2002-03.html.",
1490
+ "severity": "medium"
1491
+ },
1492
+ {
1493
+ "id": "SRG-NET-000243-IDPS-000222",
1494
+ "title": "The IDPS must be configured to implement automated patch management tools to facilitate flaw remediation to network components.",
1495
+ "description": "It is imperative that the activity promptly installs security relevant software updates from an authorized patch management server to mitigate the risk of new vulnerabilities. Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling, are also addressed expeditiously. Software obtained from unauthorized sources may contain malicious code and may put the enclave at risk.",
1496
+ "severity": "medium"
1497
+ },
1498
+ {
1499
+ "id": "SRG-NET-000244-IDPS-000226",
1500
+ "title": "The IDPS must protect the enclave from malware and unexpected traffic by using TCP reset signatures.",
1501
+ "description": "By listening to the conversation flow of inbound and outbound internet traffic for malware and malware references, the IDPS can prevent unwanted programs entering into the enclave. When it detects unmanaged instant messaging and peer-to-peer protocols or malware coming over IM, the IDPS can prevent the unwanted computer programs from entering the network by spoofing the source and destination machine addresses to send each session partner a TCP reset packet. The TCP reset instructs both sender and receiver to cease the current transfer of data.",
1502
+ "severity": "medium"
1503
+ },
1504
+ {
1505
+ "id": "SRG-NET-000244-IDPS-000227",
1506
+ "title": "The IDPS must provide an automated means to review and validate whitelists and blacklists entries.",
1507
+ "description": "A blacklist is a list of discrete entities, such as hosts, TCP or UDP port numbers, ICMP\ntypes and codes, applications, usernames, URLs, filenames, or file extensions, that have been previously determined to be associated with malicious activity. Blacklists, also known as hot lists, are typically used to allow the IDPS to recognize and block activity that is highly likely to be malicious, and may also be used to assign a higher priority to alerts that match entries on the blacklists. Some the IDPS generate dynamic blacklists that are used to temporarily block recently detected threats (e.g., activity from an attacker's IP address). A whitelist is a list of discrete entities that are known to be benign. Whitelists are typically used on a granular basis, such as protocol-by-protocol, to reduce or ignore false positives involving known benign activity from trusted hosts. Whitelists and blacklists are most commonly used in signature-based detection and stateful protocol analysis. If these lists are not kept updated, the IDPS may not recognized newly created malicious attacks.",
1508
+ "severity": "medium"
1509
+ },
1510
+ {
1511
+ "id": "SRG-NET-000244-IDPS-000228",
1512
+ "title": "The IDPS must implement signatures to detect specific attacks and protocols known to affect web servers.",
1513
+ "description": "In the Regional Enterprise Enclave different sets of sensors will see different traffic as a result of their location within the regional enclave. By establishing separate signature profiles for each set of sensors, each profile can then be tuned to generate alarms based on the traffic types seen, the attack signatures, and the specific traffic (string signatures) that is relevant to that particular set of sensors. If more than one set of sensors will see the same traffic types, then the same signature profile may be used for both sets. Alerting on specific connection signatures, general attack signatures, and specific string signatures provides focused segment analysis at Layers 4 through 7.\n\nThe IDPS system administrator will ensure the sensor monitoring the web servers is configured for application inspection and control of all web ports (e.g., 80, 3128, 8000, 8010, 8080, 8888, 24326) The sensor monitoring the web servers should be capable of inspecting web traffic that is not received on web.\n",
1514
+ "severity": "medium"
1515
+ },
1516
+ {
1517
+ "id": "SRG-NET-000244-IDPS-000229",
1518
+ "title": "The IDPS must ensure IP hijacking signatures have been implemented.",
1519
+ "description": "There are a number of publicly available tools that exist to facilitate the hijacking of TCP sessions. An attacker using such tools can determine the TCP sequence and acknowledgement numbers that two hosts are using in a communication session. This information could enable the attacker to take over the legitimate network connection of an authorized user and inject commands into the session. This is particularly serious because most forms of one-time passwords do not prevent this access.",
1520
+ "severity": "medium"
1521
+ },
1522
+ {
1523
+ "id": "SRG-NET-000244-IDPS-000230",
1524
+ "title": "The sensor positioned to protect servers in the server farm or DMZ must provide protection from DoS SYN Flood attacks by dropping half open TCP sessions.\n",
1525
+ "description": "SYN flood sends a flood of TCP/SYN packets, often with a forged sender address. Each of these packets is handled like a connection request, causing the server to spawn a half-open connection, by sending back a TCP/SYN-ACK packet, and waiting for a packet in response from the sender address. However, because the sender address is forged, the response never comes. These half-open connections saturate the number of available connections the server is able to make, keeping it from responding to legitimate requests until after the attack ends.\nIf the server farm is being monitored by an IDS as opposed to an IPS that can block traffic inline, the following alternatives can be implemented: Upon detection of a SYN flood attack; the IDS can dynamically push (or remotely configure) an ACL unto the upstream router; or multi-layer switch that can serve as the blocking device for the TCP SYN flood attack. \nConfigure TCP Intercept on the server farm's first hop router, MLS, or firewall that is controlling access to the server farm subnet (VLAN).\n",
1526
+ "severity": "medium"
1527
+ },
1528
+ {
1529
+ "id": "SRG-NET-000244-IDPS-000231",
1530
+ "title": "The LAND DoS signature must be implemented to protect the enclave.",
1531
+ "description": "The LAND attack is a DoS attack in which an attacker sends a TCP packet (with the SYN bit set) to a system in which the source and destination IP address (along with the source and destination port) are the same. If network traffic is not protected against this type of attack, this may cause a DoS on the network.\nAn effective implementation is the use of an Atomic attack signature that looks at a single packet, because State information (tracking established connections) is not necessary in identifying this attack.",
1532
+ "severity": "medium"
1533
+ },
1534
+ {
1535
+ "id": "SRG-NET-000245-IDPS-NA",
1536
+ "title": "The IDPS must employ malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means.",
1537
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Malicious code can be transported by electronic mail, mail attachments, Web accesses, and removable media.",
1538
+ "severity": "medium"
1539
+ },
1540
+ {
1541
+ "id": "SRG-NET-000246-IDPS-NA",
1542
+ "title": "The IDPS must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.",
1543
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Malicious code can be transported by electronic mail, mail attachments, Web accesses, and removable media. Implement IDPS signatures that protect against LAND attacks.",
1544
+ "severity": "medium"
1545
+ },
1546
+ {
1547
+ "id": "SRG-NET-000247-IDPS-NA",
1548
+ "title": "The IDPS must employ malicious code protection mechanisms to perform periodic scans of the information system on an organizationally defined frequency.",
1549
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Many of these are not detected by anti-virus software or even host intrusion detection systems. Once they have residency within the network, unauthorized users are able to breach firewalls and access sensitive data by assuming the identity of authorized users. Vulnerability assessment scans must be performed on a regular basis to identify devices that are vulnerable or have already been breached by malicious code.",
1550
+ "severity": "medium"
1551
+ },
1552
+ {
1553
+ "id": "SRG-NET-000248-IDPS-NA",
1554
+ "title": "The IDPS must be configured to perform real-time scans of files from external sources as they are downloaded and prior to being opened or executed",
1555
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Many of these are not detected by anti-virus software or even host intrusion detection systems. Once they have residency within the network, unauthorized users are able to breach firewalls and access sensitive data by assuming the identity of authorized users. Real-time scans must be performed on files from external sources as they are downloaded and prior to being opened or executed.",
1556
+ "severity": "medium"
1557
+ },
1558
+ {
1559
+ "id": "SRG-NET-000249-IDPS-NA",
1560
+ "title": "The IDPS must be configured to perform organizationally defined actions in response to malicious code detection.",
1561
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Once they have residency within the network, unauthorized users are able to breach firewalls and access sensitive data by assuming the identity of authorized users. Upon detection of traffic transporting this code, the IDPS must perform organizationally defined actions.",
1562
+ "severity": "medium"
1563
+ },
1564
+ {
1565
+ "id": "SRG-NET-000250-IDPS-NA",
1566
+ "title": "The network element must address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.",
1567
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Once they have residency within the network, unauthorized users are able to breach firewalls and access sensitive data by assuming the identity of authorized users. Upon detection of traffic transporting this code, the IDPS must perform organizationally defined actions and address false positives.",
1568
+ "severity": "medium"
1569
+ },
1570
+ {
1571
+ "id": "SRG-NET-000251-IDPS-000223",
1572
+ "title": "The IDPS must automatically update malicious code protection mechanisms and signature definitions.",
1573
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. It can be transported by electronic mail, mail attachments, web accesses, removable media, or other common means. Malicious mobile code is a vehicle to remotely install malware on a computer. This type of code can be transmitted through interactive web applications such as ActiveX controls, Flash animation, or JavaScript. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. The black hats and malicious code writers continuously find new methods to attack hosts and the network infrastructure. It is imperative that new protection mechanisms developed to mitigate their risks must be installed as quickly as possible. For the IDPS, rules are also updated to detect attempts to exploit systems. Not updating the rule sets could lead to missed reconnaissance and malicious attacks.",
1574
+ "severity": "medium"
1575
+ },
1576
+ {
1577
+ "id": "SRG-NET-000252-IDPS-NA",
1578
+ "title": "The IDPS must prevent non-privileged users from circumventing malicious code protection capabilities.",
1579
+ "description": "It is critical the protection mechanisms used to detect and contain this code are not tampered with by unauthorized users. This control pertains to anti-virus products which are out of scope.",
1580
+ "severity": "medium"
1581
+ },
1582
+ {
1583
+ "id": "SRG-NET-000253-IDPS-000224",
1584
+ "title": "The IDPS must only update malicious code protection mechanisms when directed by a privileged user.",
1585
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. It is critical the protection mechanisms used to detect and contain this code are not tampered with by unauthorized users and are only updated when directed by a privileged user.",
1586
+ "severity": "medium"
1587
+ },
1588
+ {
1589
+ "id": "SRG-NET-000254-IDPS-000225",
1590
+ "title": "The IDPS must not allow users to introduce removable media into the information system.",
1591
+ "description": "Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Malicious code can be transported by electronic mail, mail attachments, web accesses, and removable media. This control pertains to anti-virus products which are out of scope.",
1592
+ "severity": "medium"
1593
+ },
1594
+ {
1595
+ "id": "SRG-NET-000255-IDPS-NA",
1596
+ "title": "IDPS sensors must interconnect and configure individual intrusion detection tools into a system-wide intrusion detection system using common protocols.",
1597
+ "description": "IDPS sensor must be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. This is a network architecture design requirement. Redesign the network architecture, so all ingress traffic will pass the sensor decrypted and is inspected by the firewall and Network IDS/IPS. This is a network architecture design requirement.",
1598
+ "severity": "medium"
1599
+ },
1600
+ {
1601
+ "id": "SRG-NET-000256-IDPS-000237",
1602
+ "title": "The IDPS must monitor inbound and outbound communications for unusual or unauthorized activities or conditions.",
1603
+ "description": "IDPS sensors must be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. Both inbound and outbound traffic must be monitored. Placing a sensor behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. Monitoring outbound traffic can also detect abnormal traffic or mischievous activities by internal personnel. Without monitoring of both outbound and inbound traffic for anomalies, critical indicators of attacks may be missed until it is too late.",
1604
+ "severity": "medium"
1605
+ },
1606
+ {
1607
+ "id": "SRG-NET-000256-IDPS-000238",
1608
+ "title": "The IPS must be configured to monitor inbound and outbound TCP and UDP packets, dropping traffic using prohibited port numbers.",
1609
+ "description": "Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. Monitoring outbound traffic can also detect abnormal traffic or mischievous activities by internal personnel.\nThe IPS must be configured to drop inbound and outbound TCP and UDP packets with the following port numbers: 67, 68, 546, 547, 647, 847, and 2490 on the IDPS. This requirement applies only if DHCPv6 is not used.",
1610
+ "severity": "medium"
1611
+ },
1612
+ {
1613
+ "id": "SRG-NET-000257-IDPS-000239",
1614
+ "title": "The IDPS must provide near real-time alerts when any of the organizationally defined list of compromise or potential compromise indicators occur.",
1615
+ "description": "When a compromise, potential compromise, or breach has been discovered by the intrusion detection system, it is critical the appropriate personnel are notified via an alert mechanism. Near real-time alerts for critical events allow the administrators to respond to these potential compromise indicators since they may miss other types of alerts if they are not logging in or at the management console.",
1616
+ "severity": "medium"
1617
+ },
1618
+ {
1619
+ "id": "SRG-NET-000258-IDPS-000240",
1620
+ "title": "The IDPS must be installed in stealth mode without an IP address on the interface with data flow.",
1621
+ "description": "Both passive and inline sensors must be installed in stealth mode. For stealth mode, an IP address is not assigned to the network interfaces used to monitor network traffic. Only network interfaces used for IDPS management will have an IP address assigned. Operating a sensor without IP addresses assigned to monitoring interfaces is known as operating in stealth mode. Stealth mode improves the security of the IDPS sensors because it prevents other hosts from initiating connections to them. This conceals the sensors from attackers and thus limits exposure to attacks. If monitoring is being performed using a switch SPAN port, the sensors must be configured in stealth mode and the Network Interface Card (NIC) must be connected to the SPAN port with no network protocol stacks bound to it. A second NIC must then be connected to an OOB network. Stealth mode will reduce the risk of the IDPS itself being attacked.",
1622
+ "severity": "medium"
1623
+ },
1624
+ {
1625
+ "id": "SRG-NET-000259-IDPS-000242",
1626
+ "title": "The IDPS must notify an organizationally defined list of incident response personnel of suspicious events.",
1627
+ "description": "Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. When a compromise, potential compromise, or breach has been discovered by the intrusion detection system, it is critical the appropriate personnel are notified via an alert mechanism.",
1628
+ "severity": "medium"
1629
+ },
1630
+ {
1631
+ "id": "SRG-NET-000260-IDPS-000241",
1632
+ "title": "The IDPS must take an organizationally defined list of least-disruptive actions to terminate suspicious events.",
1633
+ "description": "Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. When a compromise, potential compromise, or breach has been discovered by the intrusion detection system, the IDPS must take action to thwart the attack using methods creating the least disruption to network availability.",
1634
+ "severity": "medium"
1635
+ },
1636
+ {
1637
+ "id": "SRG-NET-000261-IDPS-000243",
1638
+ "title": "The IDPS must protect information obtained from network scanning from unauthorized access, modification, and deletion.",
1639
+ "description": "Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. The intrusion detection device must be configured to ensure non-privilege users are not able to circumvent the detection or alerting mechanisms. In addition, all information collected by the intrusion detection systems must be protected from unauthorized access, modification, and deletion. Train system administrators to never modify or delete portions of the log records that are stored in achieved locations as part of the official records.",
1640
+ "severity": "medium"
1641
+ },
1642
+ {
1643
+ "id": "SRG-NET-000262-IDPS-NA",
1644
+ "title": "The IDPS must ensure all encrypted traffic is visible to network monitoring tools.",
1645
+ "description": "IDPS sensors must be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. Regardless of direction, all encrypted traffic must be decrypted prior to reaching the sensor or firewall so all traffic can be monitored. This is a network architecture design requirement. Redesign the network architecture, so all ingress traffic will pass the sensor decrypted and is inspected by the firewall and Network IDS/IPS.",
1646
+ "severity": "medium"
1647
+ },
1648
+ {
1649
+ "id": "SRG-NET-000263-IDPS-000232",
1650
+ "title": "The IDPS must analyze outbound traffic at the external boundary of the network.",
1651
+ "description": "IDPS sensors must be deployed at strategic locations within the network. At a minimum, they should be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. Monitoring outbound traffic can also detect abnormal traffic or mischievous activities by internal personnel.",
1652
+ "severity": "medium"
1653
+ },
1654
+ {
1655
+ "id": "SRG-NET-000264-IDPS-000233",
1656
+ "title": "The IDPS must analyze outbound communications traffic at selected interior points within the network as deemed necessary to discover anomalies.",
1657
+ "description": "IDPS sensors must be deployed at strategic locations within the network. At a minimum, they must be deployed within the DMZ and behind the firewall. It is important to not only monitor traffic entering the enclave but also leaving. Placing an IDS behind the firewall will provide a clear analysis of what type of traffic and potential attacks are passing through the firewall. Monitoring outbound traffic enables the network operator to detect an attack towards another network with the local enclave as the base. Monitoring outbound traffic can also detect abnormal traffic or mischievous activities by internal personnel.",
1658
+ "severity": "medium"
1659
+ },
1660
+ {
1661
+ "id": "SRG-NET-000265-IDPS-000235",
1662
+ "title": "The IDPS must detect attack attempts to the wireless network.",
1663
+ "description": "DoD information could be compromised if wireless scanning is not performed to identify unauthorized WLAN clients and access points connected to or attempting to connect to the network. A wireless IDS (WIDS) sensor must be installed and placed to monitor wireless network transmissions for possible attacks and unauthorized traffic.",
1664
+ "severity": "medium"
1665
+ },
1666
+ {
1667
+ "id": "SRG-NET-000266-IDPS-000236",
1668
+ "title": "The IDPS must detect rogue wireless devices, attack attempts, and potential compromises or breaches to the wireless network.",
1669
+ "description": "DoD information could be compromised if wireless scanning is not performed to identify unauthorized WLAN clients and access points connected to or attempting to connect to the network. A wireless IDS (WIDS) sensor must be installed and placed to monitor wireless network transmissions for possible attacks and unauthorized traffic. Rogue devices are unauthorized wireless devices which are either connected to the enclave or are being used by personnel in DoD spaces. These devices may either provide attackers with a way into the enclave or attempt to breach the network.",
1670
+ "severity": "medium"
1671
+ },
1672
+ {
1673
+ "id": "SRG-NET-000267-IDPS-000245",
1674
+ "title": "The IDPS must be configured to perform periodic self-tests that verify security functionality is operational during system state changes (i.e., initialization, shutdown, and aborts.).",
1675
+ "description": "The integrity of security functions during system state changes will be periodically tested. Tests will determine the system is operating as required during each system state. The organization will define the states and conditions of operations. The frequency of these integrity checks will be also be organizationally determined. Recommendation is annual testing. The need to verify security functionality is necessary to ensure the IDPS's defense is enabled. If all security functions are not operating efficiently, the defense of the element and the network is left vulnerable and both could be breached. The security functionality for IDPS implementations is: information gathering, logging, detection, and prevention. If security functionality is not verified, the systems' defense, the system could have become compromised without the knowledge of the system administrators.\nIf automated self-tests are not available for all devices, then implement one of the following alternatives:\n(i) Document the risk as accepted.\n(ii) Provide and document manual testing procedures.",
1676
+ "severity": "low"
1677
+ },
1678
+ {
1679
+ "id": "SRG-NET-000268-IDPS-000244",
1680
+ "title": "The IDPS must respond to security function anomalies in accordance with organizationally defined responses and alternative actions.",
1681
+ "description": "Verification of security functionality is necessary to ensure the system's defenses are enabled. These anomalies are detected by running self-tests on each component in the IDPS. For those security functions that are not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Upon detection of security function anomalies or failure of automated self-tests, the IDPS must respond in accordance with organizationally defined responses and alternative actions. If security functionality is not verified, the systems' defense, the system could have become compromised without the knowledge of the system administrators. \nIf automated self-tests are not available for all devices, then implement one of the following alternatives:\n(i) Document the risk as accepted.\n(ii) Provide and document manual testing procedures.",
1682
+ "severity": "low"
1683
+ },
1684
+ {
1685
+ "id": "SRG-NET-000269-IDPS-000246",
1686
+ "title": "The IDPS must provide notification of failed automated security tests.",
1687
+ "description": "Upon detection of a failure of an automated security self-test, the network element must respond in accordance with organizationally defined responses and alternative actions. Without taking any self-healing actions or notifying an administrator, the defense of the element and the network is left vulnerable and both could be breached. If system administrators are not alerted to failed security tests, the systems' defense, the system could have become compromised without the knowledge of the system administrators.",
1688
+ "severity": "medium"
1689
+ },
1690
+ {
1691
+ "id": "SRG-NET-000270-IDPS-000245",
1692
+ "title": "The IDPS must provide automated support for the management of distributed security testing.",
1693
+ "description": "The need to verify security functionality is necessary to ensure the IDPS's defense is enabled. To scale the deployment of the verification process, the IDPS must provide automated support for the management of distributed security testing. This control addresses security verification during network state changes. The IDPS can be configured to automatically provide logs to other devices on the network to be used for security verification processes.",
1694
+ "severity": "low"
1695
+ },
1696
+ {
1697
+ "id": "SRG-NET-000271-IDPS-000247",
1698
+ "title": "The IDPS must detect unauthorized changes to software and information.",
1699
+ "description": "Anomalous behavior and unauthorized changes must be detected before the IDPS is breeched or no longer in service. Identifying the source and method used to make the unauthorized change will help to determine what data is at risk and if other systems may be affected. HIDS software must be installed on the IDPS devices and sensors to protect the device itself from being breached and to monitor for unauthorized application file changes. This requirement is applicable to network appliances. For sensors with an underlying operating system, a compliance review of operating system is required which will include this HIDS requirement.",
1700
+ "severity": "medium"
1701
+ },
1702
+ {
1703
+ "id": "SRG-NET-000272-IDPS-000216",
1704
+ "title": "The IDPS must identify and respond to potential security-relevant error conditions.",
1705
+ "description": "Error messages generated by various components and services of the network devices can indicate a possible security violation or breach. It is imperative the IDPS is configured to be able to recognize those error messages that can be a symptom of a compromise and to provide notification. The extent to which the IDPS is able to identify and handle error conditions should be guided by organizational policy, operational requirements, as well as best practices.",
1706
+ "severity": "low"
1707
+ },
1708
+ {
1709
+ "id": "SRG-NET-000273-IDPS-000217",
1710
+ "title": "The IDPS must generate notification messages containing information necessary for corrective actions for errors encountered; however, these messages must not contain organizationally defined sensitive or potentially harmful information.",
1711
+ "description": "The extent to which the IDPS is able to identify and handle error conditions is guided by organizational policy and operational requirements. However, it is imperative that the IDPS does not reveal information that may have been captured in the log data that could risk the compromise of the device or the network. Hence, the structure and content of error messages notifications sent to the system administrators or users must be carefully considered. These notifications may be sent to system administrators or users, depending on the type of message. This requirement includes device or application error conditions as well as sensor log alerts.",
1712
+ "severity": "medium"
1713
+ },
1714
+ {
1715
+ "id": "SRG-NET-000274-IDPS-000218",
1716
+ "title": "The IDPS must activate an organizationally defined alarm when a system component failure is detected.",
1717
+ "description": "An IDPS with a failing security component can potentially put the entire network at risk. If key components to maintaining network security fail to function, it is possible the IDPS will continue operating in an insecure state. It is imperative this not occur and therefore must immediately send an alarm or shut down.",
1718
+ "severity": "low"
1719
+ },
1720
+ {
1721
+ "id": "SRG-NET-000277-IDPS-NA",
1722
+ "title": "The IPS must disable network access by unauthorized devices and must log the information as a security violation.",
1723
+ "description": "Local access to the private network can easily be accomplished by merely connecting a workstation or laptop to any available wall plate or a wireless connection to a nearby access point. Remote access to the network can be accomplished via connection to a VPN gateway. Eliminating unauthorized access to the network is vital to maintaining a secured network. If the package is malformed or has an anomaly, it may cause an alert or a message to the Firewall or Router, however the IPS does not directly disable the unauthorized access.",
1724
+ "severity": "medium"
1725
+ },
1726
+ {
1727
+ "id": "SRG-NET-000278-IDPS-000011",
1728
+ "title": "The IDPS must display security attributes in human-readable form on each object output from the system to system output devices to identify an organizationally identified set of special dissemination, handling, or distribution instructions organizationally identified human readable, standard naming conventions.",
1729
+ "description": "When applications generate or output data, the associated security attributes need to be displayed. Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These attributes are typically associated with internal data structures (e.g., records, buffers, files, registry keys) within the information system and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. \nObjects output from the information system include, pages, screens, or equivalent. Output devices include printers and video displays on computer terminals, monitors, screens on notebook/laptop computers and personal digital assistants.\nIf security attributes are not displayed in human readable form, then it is difficult to disseminate errors in information access control or information flow policy. \n",
1730
+ "severity": "low"
1731
+ },
1732
+ {
1733
+ "id": "SRG-NET-000279-IDPS-000039",
1734
+ "title": "The IDPS must prevent access to organizationally defined security-relevant information except during secure, non-operable system states.",
1735
+ "description": "Security relevant information is any information within the information system that can potentially impact the operation of security functions in a manner that could result in failure to enforce the system security policy or maintain isolation of code and data. Organizations may define specific security relevant information that requires protection. Examples: IDPS sensor rules, cryptographic key management information, key configuration parameters for security services, and access control lists. Secure, non-operable system states are states in which the IDPS is not performing mission or business-related processing (e.g., the system is off-line for maintenance, troubleshooting, boot-up, shutdown). Access to these types of data is to be prevented unless the system is in a maintenance mode or has otherwise been brought off-line. The goal is to minimize the potential that a security configuration or data may be dynamically and perhaps maliciously overwritten or changed without going through a formal system change process that can document the changes.",
1736
+ "severity": "medium"
1737
+ },
1738
+ {
1739
+ "id": "SRG-NET-000280-IDPS-000052",
1740
+ "title": "The IDPS must enforce information flow control on metadata.",
1741
+ "description": "Metadata is defined as data providing information about one or more pieces of data such as purpose of the data, author or creator of the data, network location of where data was created, and network specific information. Information flow control regulates where information is allowed to travel within a network and between hosts as opposed to who is allowed to access the information. Information flow enforcement mechanisms compare security attributes on all information such as source and destination objects, and respond appropriately (e.g., block, quarantine, alert administrator) when the mechanisms encounter information flows not explicitly allowed by the information flow policy. This is a network architecture best practice and does not require a configuration setting on the IDS or IPS sensor.",
1742
+ "severity": "medium"
1743
+ },
1744
+ {
1745
+ "id": "SRG-NET-000281-IDPS-NA",
1746
+ "title": "The IDPS must identify information flows by data type specification and usage when transferring information between different security domains.",
1747
+ "description": "Traffic flows must be identified by types and traffic rates when information is being transferred between different security domains. This requirement applies to Cross Domain Solutions. Implementation and placement of the IDS and IDP sensors and components must not be designed to require information transfer across security domains that differ in classification. There is a high risk of contamination because of the monitoring functionality of the sensors.",
1748
+ "severity": "medium"
1749
+ },
1750
+ {
1751
+ "id": "SRG-NET-000282-IDPS-NA",
1752
+ "title": "The IDPS must decompose information into policy-relevant subcomponents for submission to policy enforcement mechanisms when transferring information between different security domains.",
1753
+ "description": "Information must be decomposed into policy-relevant subcomponents, so the applicable policies and filters can be applied when information is being transferred between different security domains. This requirement applies to information flow control for Cross Domain Solutions. Implementation and placement of the IDS and IDP sensors and components must not be designed to require information transfer across security domains that differ in classification. There is a high risk of contamination because of the monitoring functionality of the sensors.",
1754
+ "severity": "medium"
1755
+ },
1756
+ {
1757
+ "id": "SRG-NET-000283-IDPS-NA",
1758
+ "title": "The IDPS must implement policy filters that constrain data structure and content to organizationally defined information security policy requirements when transferring information between different security domains.",
1759
+ "description": "It is imperative that when information is being moved from one security domain to another, policy filters must be applied to the data to enforce the organization's security policy requirements. This requirement applies to information flow control for Cross Domain Solutions. Implementation and placement of the IDS and IDP sensors and components must not be designed to require information transfer across security domains that differ in classification. There is a high risk of contamination because of the monitoring functionality of the sensors.",
1760
+ "severity": "medium"
1761
+ },
1762
+ {
1763
+ "id": "SRG-NET-000284-IDPS-NA",
1764
+ "title": "The IDPS must detect unsanctioned information when transferring information between different security domains.",
1765
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled, so it does not introduce any unacceptable risk to the network infrastructure or data. It is imperative that when information is being moved from one security domain to another, mechanisms are deployed to detect traffic with payloads that are not in conformance with the policy of the DoD and the organization. This requirement applies to information flow control for Cross Domain Solutions. Implementation and placement of the IDS and IDP sensors and components must not be designed to require information transfer across security domains that differ in classification. There is a high risk of contamination because of the monitoring functionality of the sensors.",
1766
+ "severity": "medium"
1767
+ },
1768
+ {
1769
+ "id": "SRG-NET-000285-IDPS-NA",
1770
+ "title": "The IDPS must prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains.",
1771
+ "description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled, so it does not introduce any unacceptable risk to the network infrastructure or data. It is imperative that when information is being moved from one security domain to another, policy filters must be applied to the data to enforce the organizations security policy requirements. \nActions to support this requirement include, but are not limited to: checking packet payload for embedded malware; dropping packets not conforming to standards; and blocking packets using ports and protocols that are not allowed to cross these domains based on DoD and local policy. This requirement applies to Cross Domain Solutions.\nImplementation and placement of the IDS and IDP sensors and components must not be designed to require information transfer across security domains that differ in classification. There is a high risk of contamination because of the monitoring functionality of the sensors.\n",
1772
+ "severity": "medium"
1773
+ },
1774
+ {
1775
+ "id": "SRG-NET-000286-IDPS-000103",
1776
+ "title": "The IDPS must protect the audit records of non-local accesses to privileged accounts and the execution of privileged functions.",
1777
+ "description": "Auditing may not be reliable when performed by the network element to which the user being audited has privileged access. The privileged user may inhibit auditing or modify audit records. This control enhancement helps mitigate this risk by requiring that privileged access be further defined between audit-related privileges and other privileges, thus, limiting the users with audit-related privileges. Reducing the risk of audit compromises by privileged users can also be achieved, for example, by performing audit activity on a separate information system or by using storage media that cannot be modified (e.g., write-once recording devices).",
1778
+ "severity": "medium"
1779
+ },
1780
+ {
1781
+ "id": "SRG-NET-000287-IDPS-000140",
1782
+ "title": "The IDPS console port must be configured to timeout after 10 minutes or less of inactivity.",
1783
+ "description": "Inactive user accounts pose a risk to systems and applications. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to the operating system. Operating systems need to track periods of user inactivity and disable accounts after an organizationally defined period of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised. Limiting inactivity timeout lowers the risk of an attacker hijacking an unattended session.",
1784
+ "severity": "medium"
1785
+ },
1786
+ {
1787
+ "id": "SRG-NET-000288-IDPS-000185",
1788
+ "title": "The IDPS must prevent the download of prohibited mobile code.",
1789
+ "description": "Decisions regarding the use of mobile code within the IDPS are based on the potential for the code to cause damage to the system if used maliciously. Mobile code technologies include Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript. Prohibited mobile code may contain malicious code and may be the source of network or client attacks if download is allowed.",
1790
+ "severity": "medium"
1791
+ },
1792
+ {
1793
+ "id": "SRG-NET-000289-IDPS-000184",
1794
+ "title": "The IPS must prevent the execution of prohibited mobile code.",
1795
+ "description": "The mobile code paradigm encompasses programs that can be executed on one or several hosts other than the one they originate from. Mobility of such programs implies some built-in capability for each piece of code to travel smoothly from one host to another. Mobile code systems range from simple applets to intelligent software agents. These systems offer several advantages over the more traditional distributed computing approach. Decisions regarding the employment of mobile code within the IDPS are based on the potential for the code to cause damage to the system if used maliciously. Mobile code technologies include Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript. IDPS must be configured to detect mobile code and prevent the affected traffic from reaching its intended destination and being executed.",
1796
+ "severity": "medium"
1797
+ },
1798
+ {
1799
+ "id": "SRG-NET-000290-IDPS-NA",
1800
+ "title": "The IDPS must prevent the automatic execution of mobile code in organizationally defined software applications and requires organizationally defined actions prior to executing the code.",
1801
+ "description": "Decisions regarding the employment of mobile code within the IDPS are based on the potential for the code to cause damage to the system if used maliciously. Mobile code technologies include Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript. Preventing execution of mobile code on a client is the function of a HIDS, thus this control is out of scope. \nPreventing execution of mobile code on the client is not a function of the IDPS.",
1802
+ "severity": "medium"
1803
+ },
1804
+ {
1805
+ "id": "SRG-NET-000300-IDPS-NA",
1806
+ "title": "The network element must provide the means to indicate the security status of child subspaces and (if the child supports secure resolution services) enable verification of a chain of trust among parent and child domains when operating as part of a distribution.",
1807
+ "description": "This control enables remote clients to obtain origin authentication and integrity verification assurances for the host/service name to network address resolution information obtained through the service. A domain name system (DNS) server is an example of an information system that provides name/address resolution service. Digital signatures and cryptographic keys are examples of additional artifacts. DNS resource records are examples of authoritative data. Network elements using technologies other than the DNS to map between host/service names and network addresses provide other methods of assuring the authenticity and integrity of response data. The DNS security controls are consistent with, and referenced from, OMB Memorandum 08-23.",
1808
+ "severity": "medium"
1809
+ },
1810
+ {
1811
+ "id": "SRG-NET-000301-IDPS-NA",
1812
+ "title": "The network element must provide the means to indicate the security status of child subspaces and (if the child supports secure resolution services) enable verification of a chain of trust among parent and child domains.",
1813
+ "description": "A recursive resolving or caching domain name system (DNS) server is an example of an information system that provides name/address resolution service for local clients. Authoritative DNS servers are examples of authoritative sources. Network element that use technologies other than the DNS to map between host/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.",
1814
+ "severity": "medium"
1815
+ },
1816
+ {
1817
+ "id": "SRG-NET-000302-IDPS-NA",
1818
+ "title": "The network element must perform data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources when requested by client systems.",
1819
+ "description": "A recursive resolving or caching domain name system (DNS) server is an example of an information system that provides name/address resolution service for local clients. Authoritative DNS servers are examples of authoritative sources. Network element that use technologies other than the DNS to map between host/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.",
1820
+ "severity": "medium"
1821
+ },
1822
+ {
1823
+ "id": "SRG-NET-000303-IDPS-NA",
1824
+ "title": "The network element must perform data origin authentication and data integrity verification on all resolution responses received whether or not local client systems explicitly request this service.",
1825
+ "description": "A recursive resolving or caching domain name system (DNS) server is an example of an information system that provides name/address resolution service for local clients. Authoritative DNS servers are examples of authoritative sources that own DNS data. Network element that use technologies other than the DNS to map between host/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data. DNS is not an IDPS function.",
1826
+ "severity": "medium"
1827
+ },
1828
+ {
1829
+ "id": "SRG-NET-000304-IDPS-NA",
1830
+ "title": "The network element that collectively provides name/address resolution service for an organization must be fault-tolerant.",
1831
+ "description": "A domain name system (DNS) server is an example of an information system that provides name/address resolution service. To eliminate single points of failure and to enhance redundancy, there are typically at least two authoritative domain name system (DNS) servers, one configured as primary and the other as secondary. Additionally, the two servers are commonly located in two different network subnets and geographically separated (i.e., not located in the same physical facility). With regard to role separation, DNS servers with an internal role, only process name/address resolution requests from within the organization (i.e., internal clients). DNS servers with an external role only process name/address resolution information requests from clients external to the organization (i.e., on the external networks including the Internet). The set of clients that can access an authoritative DNS server in a particular role is specified by the organization (e.g., by address ranges, explicit lists).",
1832
+ "severity": "low"
1833
+ },
1834
+ {
1835
+ "id": "SRG-NET-000305-IDPS-NA",
1836
+ "title": "The network element that collectively provides name/address resolution service for an organization must implement internal/external role separation.",
1837
+ "description": "A domain name system (DNS) server is an example of an information system that provides name/address resolution service. To eliminate single points of failure and to enhance redundancy, there are typically at least two authoritative DNS servers, one configured as primary and the other as secondary.",
1838
+ "severity": "low"
1839
+ },
1840
+ {
1841
+ "id": "SRG-NET-000306-IDPS-000037",
1842
+ "title": "The IDPS must enforce a Discretionary Access Control (DAC) policy that limits propagation of access rights.",
1843
+ "description": "Access control policies (e.g., identity-based policies, role-based policies, etc) and access enforcement mechanisms (e.g., access control lists, policy maps, and cryptography) are used to control access between users and objects (e.g., devices, data, destination addresses, etc.) within in the network. Without these security policies, access control and enforcement mechanisms will not prevent unauthorized access to user account information, system logs, and other files.",
1844
+ "severity": "low"
1845
+ },
1846
+ {
1847
+ "id": "SRG-NET-000307-IDPS-000038",
1848
+ "title": "The IDPS must enforce a DAC policy that includes or excludes access to the granularity of a single user.",
1849
+ "description": "Access control policies (e.g., identity-based policies, role-based policies, etc) and access enforcement mechanisms (e.g., access control lists, policy maps, cryptography) are employed by organizations to control access between users (or processes acting on behalf of users) and objects (e.g., devices, data, destination addresses, etc.) within in the network. This applies to locally defined accounts where the user management functionality is part of the IDPS application. This control does not negate the use of security groups for assigning access control to each member. Without granular DAC policies, access control and enforcement mechanisms will not prevent unauthorized access to account information, system logs, and other files.",
1850
+ "severity": "low"
1851
+ },
1852
+ {
1853
+ "id": "SRG-NET-000308-IDPS-000175",
1854
+ "title": "The IDPS must employ FIPS-validated or NSA-approved cryptography to implement digital signatures.",
1855
+ "description": "Cryptography is only as strong as the encryption algorithms employed to encrypt the data. Use of weak or untested certificates undermines the purposes of utilizing encryption to protect data. Traffic between the management console, sensor, and/or other network elements must be protected by cryptographic mechanisms. \nFIPS-validated cryptography is approved for use for unclassified systems. NSA-approved cryptography is approved for use for classified systems.",
1856
+ "severity": "medium"
1857
+ },
1858
+ {
1859
+ "id": "SRG-NET-000309-IDPS-000204",
1860
+ "title": "The IDPS must protect against unauthorized physical connections across the boundary protections implemented at organizationally defined list of managed interfaces.",
1861
+ "description": "Local access to the network can easily be accomplished by merely connecting a workstation or laptop to any available wall plate or a wireless connection to a nearby access point. Eliminating unauthorized access to the network is vital to maintaining a secured network.",
1862
+ "severity": "medium"
1863
+ }
1864
+ ]
1865
+ }