UCF STIG Viewer Logo

HPE 3PAR SSMC Web Server Security Technical Implementation Guide


Overview

Date Finding Count (19)
2023-05-17 CAT I (High): 3 CAT II (Med): 16 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-255254 High SSMC web server must use cryptography to protect the integrity of remote sessions.
V-255253 High SSMC web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.
V-255251 High The SSMC web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
V-255256 Medium SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
V-255257 Medium SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
V-255255 Medium SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
V-255252 Medium SSMC web server must limit the number of allowed simultaneous session requests.
V-255263 Medium SSMC web server must restrict connections from nonsecure zones.
V-255269 Medium SSMC web server must use a logging mechanism that is configured to alert the ISSO and SA in the event of a processing failure.
V-255264 Medium SSMC web server application, libraries, and configuration files must only be accessible to privileged users.
V-255261 Medium SSMC web server must set an inactive timeout for sessions.
V-255258 Medium The SSMC web server must be configured to use a specified IP address and port.
V-255259 Medium The SSMC web server must perform RFC 5280-compliant certification path validation.
V-255268 Medium SSMC web server must initiate session logging upon start up.
V-255260 Medium SSMC web server must set an absolute timeout for sessions.
V-255267 Medium SSMC web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
V-255265 Medium SSMC web server must enable strict two-factor authentication for access to the webUI.
V-255262 Medium SSMC web server must set an inactive timeout for shell sessions.
V-255266 Medium SSMC web server must not impede the ability to write specified log record content to an audit log server.