UCF STIG Viewer Logo

ForeScout CounterACT ALG Security Technical Implementation Guide


Overview

Date Finding Count (12)
2018-01-03 CAT I (High): 0 CAT II (Med): 11 CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC II - Mission Support Public)

Finding ID Severity Title
V-76191 Medium CounterACT must use an Enterprise Manager or other high availability solution to ensure redundancy in case of audit failure in this critical network access control and security service.
V-76189 Medium CounterACT must off-load audit records onto a centralized log server in real time.
V-76187 Medium CounterACT, when providing user authentication intermediary services, must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
V-76185 Medium CounterACT, when providing user authentication intermediary services, must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
V-75913 Medium CounterACT, when providing user access control intermediary services, must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.
V-75943 Medium CounterACT must off-load audit records onto a centralized log server.
V-75937 Medium If user authentication services are provided, CounterACT must be configured with a pre-established trust relationship and mechanisms with a central directory service that validates user account access authorizations and privileges.
V-75941 Medium CounterACT, when providing user authentication intermediary services, must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
V-75935 Medium CounterACT must send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs.
V-75933 Medium CounterACT, when providing user access control intermediary services for publicly accessible applications, must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.
V-75939 Medium If user authentication services are provided, CounterACT must restrict user authentication traffic to specific authentication server(s).
V-75931 Low CounterACT, when providing user access control intermediary services, must retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.