Ensuring the system prohibits use of nonsecure functions
Rule Title: RiOS must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
STIG ID: RICX-DM-000096
Rule ID: SV-77439r1_rule Severity: CAT II
Vuln ID: V-62949 Class: Unclass
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (that is, embedding of data types within data types), organizations must disable unused or unnecessary physical and logical ports/protocols on information systems.
Network devices are capable of providing a wide variety of functions and services. Some of the functions and services provided by default might not be necessary to support essential organizational operations. Additionally, it is sometimes convenient to provide multiple services from a single component (for example, email and web services); however, doing so increases risk over limiting the services provided by any one component.
To support the requirements and principles of least functionality, the network device must support the organization’s requirements providing only essential capabilities and limiting the use of ports, protocols, and/or services to only those required, authorized, and approved to conduct official business or to address authorized quality of life issues.
Verifying the system prohibits use of nonsecure functions
Verify that RiOS is configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.
1. Connect to the Management Console.
2. Choose Administration > Security: Management ACL to display the Management ACL page.
3. Verify that the Enable Management ACL check box is selected.
4. Verify that the list contains all unnecessary and/or nonsecure functional, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments. If no PPSM CAL or vulnerability assessment information is presented on this page or Enable Management ACL is not checked, this is a security vulnerability finding.
Configuring the system to prohibit use of nonsecure functions
Configure RiOS to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
1. Connect to the Management Console.
2. Choose Administration > Security: Management ACL to display the Management ACL page.
3. Click Add a New Rule to expand the page.
4. Select the Enable Management ACL check box.
5. Add rules so that the list contains unnecessary and/or nonsecure functional, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.
6. Apply, and then save your changes.