Riverbed NetProfiler Security Technical Implementation Guide

Overview

VersionDateFinding Count (25)Downloads
22024-08-27CAT I (High): 6CAT II (Medium): 17CAT III (Low): 2
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Classified

Finding IDSeverityTitleDescription
V-256073
LOWMEDIUMHIGH
The Riverbed NetProfiler must enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 30 minutes, at a minimum.By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, ...
V-256074
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to display the Standard Mandatory DOD Notice and Consent Banner before granting access to the device.Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is c...
V-256075
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to retain the Standard Mandatory DOD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.The administrator must acknowledge the banner prior to the device allowing the administrator access to the network device. This provides assurance tha...
V-256077
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within d...
V-256078
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.Authentication for administrative (privileged-level) access to the device is required at all times. An account can be created on the device's local da...
V-256080
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to enforce a minimum 15-character password length.Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password ...
V-256081
LOWMEDIUMHIGH
The Riverbed NetProfiler must configure the local account password to "require mixed case".Use of complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure ...
V-256082
LOWMEDIUMHIGH
The Riverbed NetProfiler must require that at least one special character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-256085
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to synchronize internal information system clocks using redundant authoritative time sources.The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly in...
V-256086
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generate...
V-256087
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records. Time stamps generated by...
V-256088
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authenticati...
V-256089
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.If NTP is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to ne...
V-256091
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to protect against known types of denial-of-service (DOS) attacks by restricting web and SSH access to the appliance.DOS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-256092
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to use redundant Syslog servers that are configured on a different system than the NetProfiler appliance.Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information sy...
V-256094
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agenci...
V-256097
LOWMEDIUMHIGH
The network device must terminate shared/group account credentials when members leave the group.A shared/group account credential is a shared form of authentication that allows multiple individuals to access the network device using a single acco...
V-256071
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to limit the number of concurrent sessions to one for the locally defined administrator account.Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of al...
V-256096
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to conduct backups of system-level information and system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.System-level information includes default and customized settings and security attributes, including access control lists (ACLs) that relate to the ne...
V-256072
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.Auditing can be disabled in the NetProfiler. The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to...
V-256079
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.The lack of role-based access control could result in the immediate compromise of and unauthorized access to sensitive information. Additionally, with...
V-256084
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management se...
V-256090
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 validated algorithm to protect the confidentiality and integrity of all cryptographic functions.If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to eavesdropping, ...
V-256093
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to use an authentication server to authenticate users prior to granting administrative access.Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important...
V-256095
LOWMEDIUMHIGH
The Riverbed NetProfiler must be configured to run an operating system release that is currently supported by the vendor.Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilit...