HPE 3PAR SSMC Operating System Security Technical Implementation Guide

Overview

VersionDateFinding Count (14)Downloads
22024-08-27CAT I (High): 0CAT II (Medium): 12CAT III (Low): 2
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Public

Finding IDSeverityTitleDescription
V-255237
LOWMEDIUMHIGH
Any publicly accessible connection to SSMC must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system.Display of a standardized and approved use notification before granting access to the publicly accessible operating system ensures privacy and securit...
V-255238
LOWMEDIUMHIGH
SSMC must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system.Display of a standardized and approved use notification before granting access to SSMC ensures privacy and security notification verbiage used is cons...
V-255239
LOWMEDIUMHIGH
SSMC must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the system. The act of managing s...
V-255240
LOWMEDIUMHIGH
SSMC must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account....
V-255241
LOWMEDIUMHIGH
SSMC must enforce a minimum 15-character password length.The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexit...
V-255242
LOWMEDIUMHIGH
SSMC must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.Any operating system providing too much information in error messages risks compromising the data and security of the structure, and content of error ...
V-255243
LOWMEDIUMHIGH
SSMC must be configured to offload logs to a SIEM that is configured to alert the ISSO or SA when the local built-in admin account (ssmcadmin) is accessed.Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal...
V-255244
LOWMEDIUMHIGH
SSMC must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular ev...
V-255245
LOWMEDIUMHIGH
For PKI-based authentication, SSMC must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly tru...
V-255247
LOWMEDIUMHIGH
SSMC must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management se...
V-255248
LOWMEDIUMHIGH
SSMC must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary ...
V-255250
LOWMEDIUMHIGH
SSMC must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility.In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocat...
V-255246
LOWMEDIUMHIGH
SSMC must enforce the limit of three consecutive invalid logon attempts by a nonadministrative user.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-255249
LOWMEDIUMHIGH
SSMC must provide audit record generation capability for DOD-defined auditable events for all operating system components.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...