1.1.1 Ensure default password of root is not allowed | IDENTIFICATION AND AUTHENTICATION |
1.1.2 Ensure default password of admin is not used | IDENTIFICATION AND AUTHENTICATION |
1.1.3 Configure Secure Password Policy | IDENTIFICATION AND AUTHENTICATION |
2.5 Ensure External Users' has access to needed Partitions only | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.6 Ensure External Users' Terminal Access is Disabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
3.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for Configuration utility sessions | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
3.2 Ensure access to Configuration utility by clients using TLS version 1.2 or later | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3 Ensure access to Configuration utility is restrcited to needed IP addresses only | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
4.1 Ensure Prelogin 'Login Banner' is set | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.2 Ensure 'Idle timeout' is less than or equal to 10 minutes for SSH connections | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.3 Ensure 'Idle timeout' is less than or equal to 10 minutes for tmsh sessions | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.4 Ensure 'Idle timeout' is less than or equal to 10 minutes for serial console sessions | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.5 Ensure minimum SSH Encryption algorithm is set to aes128-cbc | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.6 Ensure to set SSH MAC algorithm to hmac-sha2-256 | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.7 Ensure to set Strong SSH KEY Exchange algorithm | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
4.8 Ensure access SSH to CLI interface is restricted to needed IP addresses only | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
5.1 Ensure redundant NTP servers are configured appropriately | AUDIT AND ACCOUNTABILITY |
5.2 Ensure to exclude inode information from ETags HTTP Header | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
5.3 Ensure port lockdown for self IP is set | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
5.4 Ensure to disable unused services in BIG-IP configuration | CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.1 Ensure that SNMP access is allowed to trusted agents IPs only | CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.2 Ensure minimum SNMP version is set to V3 for agent access | CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.3 Ensure to lockdown access logs to "Administrator , Resource Administrator and Auditor " roles only | AUDIT AND ACCOUNTABILITY |
6.4 Ensure that audit logging for "MCP, tmsh and GUI" is set to enabled | AUDIT AND ACCOUNTABILITY |
6.5 Ensure that Remote Syslog Servers are configured | AUDIT AND ACCOUNTABILITY |