Dragos Platform 2.x Security Technical Implementation Guide

Overview

VersionDateFinding Count (19)Downloads
12025-05-15CAT I (High): 1CAT II (Medium): 18CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC I - Mission Critical Sensitive

Finding IDSeverityTitleDescription
V-270904
LOWMEDIUMHIGH
Dragos must configure idle timeouts at 10 minutes.A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information syst...
V-270910
LOWMEDIUMHIGH
Dragos Platform must use an Identity Provider (IDP) for authentication and authorization processes.Enterprise environments make application account management challenging and complex. A manual process for account management functions adds the risk o...
V-270916
LOWMEDIUMHIGH
The Dragos Platform must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system.Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbi...
V-270917
LOWMEDIUMHIGH
The publicly accessible Dragos Platform application must display the Standard Mandatory DOD Notice and Consent Banner before granting access to Dragos Platform.Display of a standardized and approved use notification before granting access to the publicly accessible application ensures privacy and security not...
V-270919
LOWMEDIUMHIGH
The Dragos Platform must only allow local administrative and service user accounts.Only two default accounts facilitate the initial setup and configuration of the Platform. These accounts provide immediate access to the system, allow...
V-270932
LOWMEDIUMHIGH
The Dragos Platform must have notification and audit services installed.Installing the Knowledge Pack(s) is essential for the Dragos Platform to provide comprehensive security monitoring, compliance, and operational visibi...
V-270944
LOWMEDIUMHIGH
The Dragos Platform must be configured to send backup audit records.Configuring the Dragos Platform to send out backup audit records is a critical best practice for ensuring the security, integrity, and availability of...
V-270945
LOWMEDIUMHIGH
The Dragos Platform must have disk encryption enabled on a virtual machines (VMs).Enabling disk encryption on VMs running the Dragos Platform is a critical security measure to protect sensitive data, ensure compliance with regulatio...
V-270952
LOWMEDIUMHIGH
Dragos must allow only the individuals appointed by the information system security manager (ISSM) to have full admin rights to the system.Without restricting which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of cri...
V-270955
LOWMEDIUMHIGH
The Dragos Platform must configure local password policies.The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexit...
V-270978
LOWMEDIUMHIGH
Dragos must use FIPS-validated encryption and hashing algorithms to protect the confidentiality and integrity of application configuration files and user-generated data stored or aggregated on the device.Confidentiality and integrity protections are intended to address the confidentiality and integrity of system information at rest (e.g., network devic...
V-270993
LOWMEDIUMHIGH
The Dragos Platform must notify system administrators and information system security officer (ISSO) of local account activity.Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establishing access. One way to...
V-271008
LOWMEDIUMHIGH
Dragos Platform must allocate audit record storage retention length.In order to ensure applications have a sufficient storage capacity in which to write the audit logs, applications need to be able to allocate audit re...
V-271027
LOWMEDIUMHIGH
The Syslog client must use TCP connections.Removal of unneeded or nonsecure functions, ports, protocols, and services mitigate the risk of unauthorized connection of devices, unauthorized trans...
V-271034
LOWMEDIUMHIGH
Dragos Platform must accept the DOD CAC or other PKI credential for identity management and personal authentication.The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized access. PIV credentials ...
V-271049
LOWMEDIUMHIGH
The Dragos Platform must only allow the use of DOD PKI established certificate authorities for verification of the establishment of protected sessions.Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DOD syst...
V-271070
LOWMEDIUMHIGH
The Dragos Platform must alert the information system security officer (ISSO), information system security manager (ISSM), and other individuals designated by the local organization when events are detected that indicate a compromise or potential for compromise.When a security event occurs, Dragos Platform must immediately notify the appropriate support personnel so they can respond appropriately. Alerts may...
V-271105
LOWMEDIUMHIGH
Before establishing a network connection with a Network Time Protocol (NTP) server, Dragos Platform must authenticate using a bidirectional, cryptographically based authentication method that uses a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the NTP server.Without device-to-device authentication, communications with malicious devices may be established. Bidirectional authentication provides stronger safe...
V-270947
LOWMEDIUMHIGH
Dragos Platforms must limit privileges and not allow the ability to run shell.If Dragos Platform were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the approp...