F5 BIG-IP TMOS NDM Security Technical Implementation Guide

Overview

VersionDateFinding Count (29)Downloads
12025-06-12CAT I (High): 8CAT II (Medium): 20CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Classified

Finding IDSeverityTitleDescription
V-266064
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to limit the number of concurrent sessions to the Configuration Utility to 10 or an organization-defined number.Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of al...
V-266065
LOWMEDIUMHIGH
The F5 BIG-IP appliance must terminate shared/group account credentials when members leave the group.A shared/group account credential is a shared form of authentication that allows multiple individuals to access the network device using a single acco...
V-266066
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.Authentication for administrative (privileged level) access to the device is required at all times. An account can be created on the device's local da...
V-266068
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromise...
V-266069
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for at least 15 minutes.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, ...
V-266070
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to display the Standard Mandatory DOD Notice and Consent Banner upon access to the TMOS User Interface.Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is c...
V-266077
LOWMEDIUMHIGH
The F5 BIG-IP appliance must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generate...
V-266078
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.Changes to any software components can have significant effects on the overall security of the network device. Verifying software components have been...
V-266083
LOWMEDIUMHIGH
The F5 BIG-IP appliance must obtain its public key certificates from an appropriate certificate policy through an approved service provider.For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agenci...
V-266086
LOWMEDIUMHIGH
The F5 BIG-IP appliance must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.If NTP is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to ne...
V-266087
LOWMEDIUMHIGH
The F5 BIG-IP appliance must enforce a minimum 15-character password length.Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password ...
V-266088
LOWMEDIUMHIGH
The F5 BIG-IP appliance must enforce password complexity by requiring that at least one uppercase character be used.Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measur...
V-266089
LOWMEDIUMHIGH
The F5 BIG-IP appliance must enforce password complexity by requiring that at least one lowercase character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-266090
LOWMEDIUMHIGH
The F5 BIG-IP appliance must enforce password complexity by requiring that at least one numeric character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-266091
LOWMEDIUMHIGH
The F5 BIG-IP appliance must enforce password complexity by requiring that at least one special character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-266092
LOWMEDIUMHIGH
The F5 BIG-IP appliance must require that when a password is changed, the characters are changed in at least eight of the positions within the password.If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increa...
V-266093
LOWMEDIUMHIGH
The F5 BIG-IP appliance must prohibit the use of cached authenticators after eight hours or less.Some authentication implementations can be configured to use cached authenticators. If cached authentication information is out-of-date, the validity...
V-266096
LOWMEDIUMHIGH
The F5 BIG-IP appliance must conduct backups of the configuration at a weekly or organization-defined frequency and store on a separate device.Information system backup is a critical step in maintaining data assurance and availability. Information system and security-related documentation con...
V-266134
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to display the Standard Mandatory DOD Notice and Consent Banner when accessing via SSH.Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is c...
V-266135
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to restrict a consistent inbound IP for the entire management session.This security measure helps limit the effects of denial-of-service (DoS) attacks by employing anti-session hijacking security safeguards. Session hija...
V-266074
LOWMEDIUMHIGH
The F5 BIG-IP appliance must manage local audit storage capacity in accordance with organization-defined audit record storage requirements.To ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able to allocate audit record storage c...
V-266067
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to assign appropriate user roles or access levels to authenticated users.Successful identification and authentication must not automatically give an entity full access to a network device or security domain. Authorization...
V-266075
LOWMEDIUMHIGH
The F5 BIG-IP appliance must generate audit records and send records to redundant central syslog servers that are separate from the appliance.Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Without generating audit records that are specif...
V-266079
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to use at least two authentication servers to authenticate administrative users.Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important...
V-266080
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be running an operating system release that is currently supported by the vendor.Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilit...
V-266084
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within d...
V-266085
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to use multifactor authentication (MFA) for interactive logins.MFA is when two or more factors are used to confirm the identity of an individual who is requesting access to digital information resources. Valid fac...
V-266094
LOWMEDIUMHIGH
The F5 BIG-IP appliance must be configured to use DOD approved OCSP responders or CRLs to validate certificates used for PKI-based authentication.Once issued by a DOD certificate authority (CA), public key infrastructure (PKI) certificates are typically valid for three years or shorter within th...
V-266095
LOWMEDIUMHIGH
The F5 BIG-IP appliance must set the idle time before automatic logout to five minutes of inactivity except to fulfill documented and validated mission requirements.Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management se...