UCF STIG Viewer Logo

Trend Micro TippingPoint NDM Security Technical Implementation Guide


Overview

Date Finding Count (30)
2021-06-09 CAT I (High): 8 CAT II (Med): 17 CAT III (Low): 5
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Public)

Finding ID Severity Title
V-242250 High The TippingPoint SMS must authenticate Network Time Protocol sources using authentication that is cryptographically based.
V-242251 High The TippingPoint TPS must have FIPS mode enforced.
V-242254 High The TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.
V-242259 High The TippingPoint SMS must automatically generate audit records for account changes and actions with containing information needed for analysis of the event that occurred on the SMS and TPS.
V-242236 High The TippingPoint SMS must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.
V-242244 High The TippingPoint SMS must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
V-242243 High The TippingPoint TPS must have FIPS Mode enforced.
V-242249 High The TippingPoint SMS must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
V-242252 Medium The TippingPoint SMS must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.
V-242256 Medium The TippingPoint SMS must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
V-242257 Medium The TippingPoint SMS must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
V-242255 Medium The TippingPoint SMS must be configured to conduct backups of system level information contained in the information system when changes occur.
V-242258 Medium The TippingPoint SMS must be running an operating system release that is currently supported by the vendor.
V-242234 Medium The TippingPoint SMS must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.
V-242237 Medium The TippingPoint SMS must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.
V-242238 Medium The TippingPoint SMS must enforce a minimum 15-character password length.
V-242239 Medium The TippingPoint SMS must enforce password complexity by requiring that at least one uppercase character be used.
V-242245 Medium The Trend Micro SMS must generate an alert for all audit failure events requiring real-time alerts.
V-242247 Medium The TippingPoint SMS must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
V-242246 Medium The TippingPoint SMS must be configured to synchronize internal information system clocks using redundant authoritative time sources.
V-242241 Medium The TippingPoint SMS must enforce password complexity by requiring that at least one numeric character be used.
V-242240 Medium The TippingPoint SMS must enforce password complexity by requiring that at least one lowercase character be used.
V-242242 Medium The TippingPoint SMS must enforce password complexity by requiring that at least one special character be used.
V-242248 Medium The TippingPoint SMS must enforce access restrictions associated with changes to device configuration.
V-242260 Medium The password for the local account of last resort and the device password (if configured) must be changed when members who had access to the password leave the role and are no longer authorized access.
V-242253 Low The TippingPoint SMS must generate audit records when successful/unsuccessful logon attempts occur.
V-242231 Low The TippingPoint SMS must limit the maximum number of concurrent active sessions to one for the account of last resort.
V-242232 Low The TippingPoint SMS must limit total number of user sessions for privileged uses to a maximum of 10.
V-242233 Low The TippingPoint SMS must disable auto reconnect after disconnect.
V-242235 Low The TippingPoint SMS, TPS, and SMS client must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.