UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

HPE 3PAR SSMC Web Server Security Technical Implementation Guide


Overview

Date Finding Count (19)
2024-05-30 CAT I (High): 3 CAT II (Med): 16 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-255254 High SSMC web server must use cryptography to protect the integrity of remote sessions.
V-255253 High SSMC web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.
V-255251 High The SSMC web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
V-255256 Medium SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
V-255257 Medium SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
V-255255 Medium SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
V-255252 Medium SSMC web server must limit the number of allowed simultaneous session requests.
V-255263 Medium SSMC web server must restrict connections from nonsecure zones.
V-255269 Medium SSMC web server must use a logging mechanism that is configured to alert the ISSO and SA in the event of a processing failure.
V-255264 Medium SSMC web server application, libraries, and configuration files must only be accessible to privileged users.
V-255261 Medium SSMC web server must set an inactive timeout for sessions.
V-255258 Medium The SSMC web server must be configured to use a specified IP address and port.
V-255259 Medium The SSMC web server must perform RFC 5280-compliant certification path validation.
V-255268 Medium SSMC web server must initiate session logging upon start up.
V-255260 Medium SSMC web server must set an absolute timeout for sessions.
V-255267 Medium SSMC web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
V-255265 Medium SSMC web server must enable strict two-factor authentication for access to the webUI.
V-255262 Medium SSMC web server must set an inactive timeout for shell sessions.
V-255266 Medium SSMC web server must not impede the ability to write specified log record content to an audit log server.