Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-18836 | SRC-NAC-080 | SV-20589r3_rule | High |
Description |
---|
Automated policy assessment must validate the organization's minimum security requirements so entry control decisions do not put the organization at risk because of a compromised remote device. Outdated or disabled security functions on remote endpoints present an immediate threat to the trusted network if allowed entry based solely on the user’s access and authorization, particularly if the user has elevated access or management access to data and systems. The goal of this policy is centralized policy assessment for remote access devices. Each of the checks required in this policy serves to mitigate known risks to the trusted network using the endpoint as an attack vector, thus all must be configured to meet this requirement. |
STIG | Date |
---|---|
Remote Access Policy STIG | 2016-03-28 |
Check Text ( C-22571r4_chk ) |
---|
Review the assessment policies configured on the NAC device to ensure the required checks are included. The required checks are listed below: - Check anti-virus software is installed, enabled, and virus signatures and scan engine are up-to-date - Check host-based firewall is installed, enabled, and up-to-date - Check Host-based IDS (HIDS) is installed, enabled, and up-to-date - Check operating system is at minimum required version and update level - Check for the presence of file-sharing and peer-to-peer applications - Scan for known and unknown (zero-day) virus outbreaks If the remote access policy assessment solution does not include checks for all of the minimum required checks above, this is a finding. |
Fix Text (F-19508r4_fix) |
---|
Configure the assessment policy for the NAC device to scan remote endpoints prior to connection to an organization's network. The following are a minimum set of required checks: - Check anti-virus software is installed, enabled, and virus signatures and scan engine are up-to-date - Check host-based firewall is installed, enabled, and up-to-date - Check Host-based IDS (HIDS) is installed, enabled, and up-to-date - Check operating system is at minimum required version and update level - Check for the presence of file-sharing and peer-to-peer applications - Scan for known and unknown (zero-day) virus outbreaks |