Forescout Network Access Control Security Technical Implementation Guide

Overview

VersionDateFinding Count (26)Downloads
22025-06-12CAT I (High): 7CAT II (Medium): 19CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC I - Mission Critical Sensitive

Finding IDSeverityTitleDescription
V-233313
LOWMEDIUMHIGH
Forescout must be configured to notify the user before proceeding with remediation of the user's endpoint device when automated remediation is used. This is required for compliance with C2C Step 3.Connections that bypass established security controls should be allowed only in cases of administrative need. These procedures and use cases must be a...
V-233317
LOWMEDIUMHIGH
When devices fail the policy assessment, Forescout must create a record with sufficient detail suitable for forwarding to a remediation server for automated remediation or sending to the user for manual remediation. This is required for compliance with C2C Step 3.Notifications sent to the user and/or network administrator informing them of remediation requirements will ensure that action is taken....
V-233319
LOWMEDIUMHIGH
Forescout must be configured so client machines do not communicate with other network devices in the DMZ or subnet except as needed to perform an access client assessment or to identify themselves. This is required for compliance with C2C Step 2.Devices not compliant with DOD secure configuration policies are vulnerable to attack. While endpoints are undergoing NAC authorization assessment, th...
V-233320
LOWMEDIUMHIGH
Forescout must enforce the revocation of endpoint access authorizations when devices are removed from an authorization group. This is required for compliance with C2C Step 4.Ensuring the conditions that are configured in policy have proper time limits set to reflect changes will allow for proper access. This will help to v...
V-233321
LOWMEDIUMHIGH
Forescout must enforce the revocation of endpoint access authorizations at the next compliance assessment interval based on changes to the compliance assessment security policy. This is required for compliance with C2C Step 4.This requirement gives the option to configure for automated remediation and/or manual remediation. A detailed record must be passed to the remediatio...
V-233322
LOWMEDIUMHIGH
Forescout must deny or restrict access for endpoints that fail critical endpoint security checks. This is required for compliance with C2C Step 4.Devices that do not meet minimum-security configuration requirements pose a risk to the DOD network and information assets. Endpoint devices must be ...
V-233324
LOWMEDIUMHIGH
Forescout must off-load log records onto a different system. This is required for compliance with C2C Step 1.Having a separate, secure location for log records is essential to the preservation of logs as required by policy. Satisfies: SRG-NET-000492-NAC-0021...
V-233325
LOWMEDIUMHIGH
Forescout must generate a critical alert to be sent to the Information System Security Officer (ISSO) and Systems Administrator (SA) (at a minimum) in the event of an audit processing failure. This is required for compliance with C2C Step 1.Ensuring that a security solution alerts in the event of misconfiguration or error is imperative to ensuring that proper auditing is being conducted. ...
V-233326
LOWMEDIUMHIGH
Forescout must authenticate all endpoint devices before establishing a connection and proceeding with posture assessment. This is required for compliance with C2C Step 4.Authenticating all devices as they connect to the network is the baseline of a good security solution. This is especially important prior to posture a...
V-233327
LOWMEDIUMHIGH
Forescout must be configured to apply dynamic ACLs that restrict the use of ports when non-entity endpoints are connected using MAC Authentication Bypass (MAB). This is required for compliance with C2C Step 4.MAB is only one way of connecting non-entity endpoints, and can be defeated by spoofing the MAC address of an assumed authorized device. By adding the...
V-233328
LOWMEDIUMHIGH
Forescout must reveal error messages only to the Information System Security Officer (ISSO), Information System Security Manager (ISSM), and System Administrator (SA). This is required for compliance with C2C Step 1.Ensuring the proper amount of information is provided to the Security Management staff is imperative to ensure role based access control. Only those i...
V-233329
LOWMEDIUMHIGH
Forescout must configure TCP for the syslog protocol to allow for detection by the central event server if communications is lost. This is required for compliance with C2C Step 1.It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notificatio...
V-233330
LOWMEDIUMHIGH
Forescout switch module must only allow a maximum of one registered MAC address per access port. This is required for compliance with C2C Step 4.Limiting the number of MAC addresses that can access from the same switch access port can help prevent a CAM table overflow attack. This type of attac...
V-233331
LOWMEDIUMHIGH
For TLS connections, Forescout must automatically terminate the session when a client certificate is requested and the client does not have a suitable certificate. This is required for compliance with C2C Step 1.In accordance with NIST SP 800-52, the TLS server must terminate the connection with a fatal “handshake failure” alert when a client certificate is re...
V-233332
LOWMEDIUMHIGH
Forescout must use TLS 1.2, at a minimum, to protect the confidentiality of information passed between the endpoint agent and Forescout for the purposes of client posture assessment. This is required for compliance with C2C Step 1.Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that explo...
V-233334
LOWMEDIUMHIGH
Communications between Forescout endpoint agent and the switch must transmit access authorization information via a protected path using a cryptographic mechanism. This is required for compliance with C2C Step 1.Forescout solution assesses the compliance posture of each client and returns an access decision based on configured security policy. The communicatio...
V-233337
LOWMEDIUMHIGH
Forescout must perform continuous detection and tracking of endpoint devices attached to the network. This is required for compliance with C2C Step 1.Continuous scanning capabilities on the NAC provide visibility of devices that are connected to the switch ports. The NAC continuously scans networks ...
V-233338
LOWMEDIUMHIGH
Forescout must deny network connection for endpoints that cannot be authenticated using an approved method. This is required for compliance with C2C Step 4.Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Identification failure does n...
V-233339
LOWMEDIUMHIGH
Forescout must use a bidirectional authentication mechanism configured with a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the endpoint device. This is required for compliance with C2C Step 1.Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are of greater risk. Currentl...
V-233309
LOWMEDIUMHIGH
Forescout must enforce approved access by employing admissions assessment filters that include, at a minimum, device attributes such as type, IP address, resource group, and/or mission conditions as defined in Forescout System Security Plan (SSP). This is required for compliance with C2C Step 4.Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authorization-based access contro...
V-233310
LOWMEDIUMHIGH
Endpoint policy assessment must proceed after the endpoint attempting access has been identified using an approved identification method such as IP address. This is required for compliance with C2C Step 2.Automated policy assessments must reflect the organization's current security policy so entry control decisions will happen only where remote endpoint...
V-233311
LOWMEDIUMHIGH
For endpoints that require automated remediation, Forescout must be configured to logically separate endpoints from the trusted network traffic during remediation. This is required for compliance with C2C Step 4.Automated and manual procedures for remediation for critical security updates will be managed differently. Continuing to assess and remediate endpoint...
V-233312
LOWMEDIUMHIGH
If a device requesting access fails Forescout policy assessment, Forescout must communicate with other components and the switch to either terminate the session or isolate the device from the trusted network for remediation. This is required for compliance with C2C Step 3.Endpoints with identified security flaws and weaknesses endanger the network and other devices on it. Isolation or termination prevents traffic from f...
V-233314
LOWMEDIUMHIGH
Forescout must be configured so that all client machines are assessed by Forescout with exceptions that are allowed to bypass Forescout based on account or account type, as approved by the information system security manager (ISSM) and documented in the System Security Plan (SSP). This is required for compliance with C2C Step 1.The NAC gateway provides the policy enforcement allowing or denying the endpoint to the network. Unauthorized endpoints that bypass this control prese...
V-233318
LOWMEDIUMHIGH
Forescout must place client machines on a blacklist or terminate network communications on devices when critical security issues are found that put the network at risk. This is required for compliance with C2C Step 4.Devices that are found to have critical security issues place the network at risk if they are allowed to continue communications. Policy actions shoul...
V-233340
LOWMEDIUMHIGH
When connecting with endpoints, Forescout must be configured to use FIPS 140-2/3 validated algorithms for encryption processes and communications. This is required for compliance with C2C Step 1.A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path vali...