Check: FORE-NC-000130
Forescout Network Access Control STIG:
FORE-NC-000130
(in versions v1 r4 through v1 r3)
Title
Forescout must enforce the revocation of endpoint access authorizations at the next compliance assessment interval based on changes to the compliance assessment security policy. This is required for compliance with C2C Step 4. (Cat II impact)
Discussion
This requirement gives the option to configure for automated remediation and/or manual remediation. A detailed record must be passed to the remediation server for action. Alternatively, the details can be passed in a notice to the user for action. The device status will be updated on the network access server/authentication server so that further access attempts are denied. The NAC must have policy assessment mechanisms with granular control to distinguish between access restrictions based on the criticality of the software or setting failure.
Check Content
If DoD is not at C2C Step 4 or higher, this is not a finding. Verify Forescout admission policy has been configured to revoke access to endpoints that have not met or are removed from the authorized group. If Forescout is not configured with an admissions policy that enforces the revocation of endpoint access authorizations based on when devices are removed from an authorization group, this is a finding.
Fix Text
Use the Forescout Administrator UI to configure the authorization policy to configured to perform a control action on any devices that have not met authorization requirement or are no longer authorized. 1. Log on to the Forescout UI. 2. From the Policy tab, check that the authorization policy has a Block Action enabled on any devices that have not met or are removed from the authorized group.
Additional Identifiers
Rule ID: SV-233321r856507_rule
Vulnerability ID: V-233321
Group Title: SRG-NET-000322-NAC-001220
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002179 |
The information system enforces the revocation of access authorizations resulting from changes to the security attributes of objects based on organization-defined rules governing the timing of revocations of access authorizations. |
Controls
Number | Title |
---|---|
AC-3 (8) |
Revocation Of Access Authorizations |