CASA-ND-000010 - The Cisco ASA must be configured to limit the number of concurrent management sessions to an organization-defined number. | ACCESS CONTROL |
CASA-ND-000090 - The Cisco ASA must be configured to automatically audit account creation. | ACCESS CONTROL |
CASA-ND-000100 - The Cisco ASA must be configured to automatically audit account modification. | ACCESS CONTROL |
CASA-ND-000110 - The Cisco ASA must be configured to automatically audit account-disabling actions. | ACCESS CONTROL |
CASA-ND-000120 - The Cisco ASA must be configured to automatically audit account removal actions. | ACCESS CONTROL |
CASA-ND-000140 - The Cisco ASA must be configured to enforce approved authorizations for controlling the flow of management information within the Cisco ASA based on information flow control policies. | ACCESS CONTROL |
CASA-ND-000160 - The Cisco ASA must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device. | ACCESS CONTROL |
CASA-ND-000210 - The Cisco ASA must be configured to protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000240 - The Cisco ASA must be configured to generate audit records when successful/unsuccessful attempts to access privileges occur. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000260 - The Cisco ASA must be configured to produce audit log records containing sufficient information to establish what type of event occurred. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000270 - The Cisco ASA must be configured to produce audit records containing information to establish when (date and time) the events occurred. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000280 - The Cisco ASA must be configured to produce audit records containing information to establish where the events occurred. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000290 - The Cisco ASA must be configured to produce audit log records containing information to establish the source of events. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000300 - The Cisco ASA must be configured to produce audit records that contain information to establish the outcome of the event. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000320 - The Cisco ASA must be configured to generate audit records containing the full-text recording of privileged commands. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000430 - The Cisco ASA must be configured to prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services. | CONFIGURATION MANAGEMENT |
CASA-ND-000450 - The Cisco ASA must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable. | ACCESS CONTROL |
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts. | IDENTIFICATION AND AUTHENTICATION |
CASA-ND-000490 - The Cisco ASA must be configured to enforce a minimum 15-character password length. | IDENTIFICATION AND AUTHENTICATION |
CASA-ND-000520 - The Cisco ASA must be configured to enforce password complexity by requiring that at least one uppercase character be used. | IDENTIFICATION AND AUTHENTICATION |
CASA-ND-000530 - The Cisco ASA must be configured to enforce password complexity by requiring that at least one lowercase character be used. | IDENTIFICATION AND AUTHENTICATION |
CASA-ND-000550 - The Cisco ASA must be configured to enforce password complexity by requiring that at least one numeric character be used. | IDENTIFICATION AND AUTHENTICATION |
CASA-ND-000570 - The Cisco ASA must be configured to enforce password complexity by requiring that at least one special character be used. | IDENTIFICATION AND AUTHENTICATION |
CASA-ND-000580 - The Cisco ASA must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password. | IDENTIFICATION AND AUTHENTICATION |
CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements. | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-ND-000910 - The Cisco ASA must be configured to audit the execution of privileged functions. | ACCESS CONTROL |
CASA-ND-000920 - The Cisco ASA must be configured to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000930 - The Cisco ASA must be configured to generate an immediate real-time alert of all audit failure events requiring real-time alerts. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000940 - The Cisco ASA must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources. | AUDIT AND ACCOUNTABILITY |
CASA-ND-000970 - The Cisco ASA must be configured to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision. | AUDIT AND ACCOUNTABILITY |
CASA-ND-001050 - The Cisco ASA must be configured to authenticate Simple Network Management Protocol (SNMP) messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC). | IDENTIFICATION AND AUTHENTICATION |
CASA-ND-001070 - The Cisco ASA must be configured to encrypt Simple Network Management Protocol (SNMP) messages using a FIPS 140-2 approved algorithm. | IDENTIFICATION AND AUTHENTICATION |
CASA-ND-001080 - The Cisco ASA must be configured to authenticate Network Time Protocol sources using authentication that is cryptographically based. | IDENTIFICATION AND AUTHENTICATION |
CASA-ND-001140 - The Cisco ASA must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of non-local maintenance and diagnostic communications. | MAINTENANCE |
CASA-ND-001150 - The Cisco ASA must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions. | MAINTENANCE |
CASA-ND-001180 - The Cisco ASA must be configured to protect against known types of denial-of-service (DoS) attacks by enabling the Threat Detection feature - DoS attacks by enabling the Threat Detection feature. | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-ND-001200 - The Cisco ASA must be configured to generate audit records when successful/unsuccessful attempts to modify administrator privileges occur. | AUDIT AND ACCOUNTABILITY |
CASA-ND-001210 - The Cisco ASA must be configured to generate audit records when successful/unsuccessful attempts to delete administrator privileges occur. | AUDIT AND ACCOUNTABILITY |
CASA-ND-001220 - The Cisco ASA must be configured to generate audit records when successful/unsuccessful logon attempts occur. | AUDIT AND ACCOUNTABILITY |
CASA-ND-001230 - The Cisco ASA must be configured to generate audit records for privileged activities or other system-level access. | AUDIT AND ACCOUNTABILITY |
CASA-ND-001240 - The Cisco ASA must be configured to generate audit records showing starting and ending time for administrator access to the system. | AUDIT AND ACCOUNTABILITY |
CASA-ND-001250 - The Cisco ASA must be configured to generate audit records when concurrent logons from different workstations occur. | AUDIT AND ACCOUNTABILITY |
CASA-ND-001310 - The Cisco ASA must be configured to use at least two authentication servers to authenticate users prior to granting administrative access. | CONFIGURATION MANAGEMENT |
CASA-ND-001350 - The Cisco ASA must be configured to conduct backups of system-level information contained in the information system when changes occur. | CONTINGENCY PLANNING |
CASA-ND-001370 - The Cisco ASA must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider. | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-ND-001410 - The Cisco ASA must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to organization-defined personnel and/or the firewall administrator. | AUDIT AND ACCOUNTABILITY |
CASA-ND-001420 - The Cisco ASA must be running an operating system release that is currently supported by Cisco Systems. | SYSTEM AND SERVICES ACQUISITION |
DISA_STIG_Cisco_ASA_NDM_v2r2.audit from DISA Cisco ASA NDM v2r2 STIG | |