UCF STIG Viewer Logo

Arista MLS EOS 4.2x NDM Security Technical Implementation Guide


Overview

Date Finding Count (21)
2023-01-11 CAT I (High): 8 CAT II (Med): 13 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-255955 High The Arista network device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
V-255956 High The Arista network device must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
V-255952 High The Arista network device must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.
V-255966 High The Arista network Arista device must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the ISSO.
V-255967 High The Arista network device must be running an operating system release that is currently supported by the vendor.
V-255960 High The Arista network devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions.
V-255961 High The Arista network device must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.
V-255963 High The network device must be configured to use an authentication server to authenticate users prior to granting administrative access.
V-255949 Medium The Arista network device must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.
V-255959 Medium The Arista network device must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
V-255948 Medium The Arista network device must enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.
V-255950 Medium The Arista network device must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the device.
V-255958 Medium The Arista network device must be configured to synchronize internal system clocks using redundant authenticated time sources.
V-255954 Medium The Arista network device must enforce a minimum 15-character password length.
V-255957 Medium If the Arista network device uses role-based access control, the network device must enforce organization-defined role-based access control policies over defined subjects and objects.
V-255951 Medium The Arista network device must be configured to audit all administrator activity.
V-255947 Medium The Arista network device must limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.
V-255953 Medium The Arista network device must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.
V-255964 Medium The network device must be configured to conduct backups of system level information contained in the information system when changes occur.
V-255965 Medium The Arista network device must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
V-255962 Medium The Arista network device must be configured to capture all DOD auditable events.