Forescout Network Access Control STIG Version Comparison
Forescout Network Access Control Security Technical Implementation Guide
There are 11 differences between versions v1 r1 (Nov. 20, 2020) (the "left" version) and v1 r2 (Oct. 27, 2021) (the "right" version).
Check FORE-NC-000010 was changed between these two versions. Green, underlined text was added, red, struck-out text was removed.
Forescout must enforce approved access by employing admissions assessment filters that include, at a minimum, device attributes such as type, IP address, resource group, and/or mission conditions as defined in Forescout System Security Plan (SSP).
Verify Use the Forescout has Administrator UI to ensure that the endpoint compliance assessment policies have been implemented per the SSP configured to include assessment filters for device attributes such as type, IP address, resource group, mission conditions, and are functioning correctly. If Forescout other criteria as defined in the NAC SSP. If the NAC does not employ admissions have compliance assessment policies configured filters which include, at a minimum, device attributes such as type, IP address, resource group, mission conditions, and other criteria as defined in the NAC SSP, this is a finding.
Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authorization-based access control could result in the immediate compromise and unauthorized access to sensitive information. Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset. Many NACs include the ability to create network access control policies that include identity-based policies, role-based policies, and attribute-based policies. It is recommended that Forescout have the capability to expose collected data on the assessed endpoints through an API that can be accessed externally, or the NAC solution must supply an SDK to allow customers to export data. Admissions assessment filters should include, at a minimum, device attributes such as type, IP address, resource group, and/or mission conditions as defined in the Forescout SSP. Forescout should also track the following to facilitate security investigations: when each device was last admitted/readmitted to the network; owning organization; owning organization's organizational unit; geographic location or the nearest network switch; motherboard serial number and BIOS; globally unique ID; and which unique network access compliance policies each device passed or failed during the latest network admission/readmission. The client may be denied admission based on a returned posture token. In most Forescout implementations, additional network access authorization policies can also be tied to the user's identity, but these features are out of scope for this STIG.
Configure Use the Forescout with device attribute Administrator UI to configure the endpoint compliance assessment policies per that include type, IP address, resource group, mission conditions, and other criteria as defined in the NAC SSP. 1. SSP. Example only: 1. Log on to Forescout UI. 2. From the Policy tab, select the top most policy. 3. Select Add >> Classification >> Primary Classification, and then click "Next". 4. Give the policy a name, then click "Next". 5. If applicable, Select select the IP Address Range the policy will apply to, click "Ok", and then click "Next". 6. Select "Finish, then click "Apply".