Содержание


НазваниеСодержание
страница29/32
ТипДокументы
filling-form.ru > Договоры > Документы
1   ...   24   25   26   27   28   29   30   31   32

Comply

6,190

Operating system releases more than one release removed from the current release (Service Pack) SHALL NOT be used.

Comply

6,191

All systems SHALL display the appropriate proprietary message and warning upon login.

Comply

6,192

The “Guest” account SHALL remain disabled (this is the default setting).

Comply

6,193

The Guest and Install Administrator accounts SHALL be disabled, renamed and have a unique password defined.

Comply

6,194

Systems SHALL be set up with a 32 bit password protected screensaver enabled by default.

Comply

6,195

Systems SHALL be set to “Prompt for password on resume from hibernate/suspend”.

Comply

6,196

The default “Administrator” account SHALL be renamed to something other "Administrator".

Comply

6,197

A new dummy account called “Administrator” SHALL then be created, with a complex password and no rights and then be disabled.

Comply

6,198

Authentication Using Passwords

Comply

6,199

The “Maximum Password Age” SHALL be settable to no more than 180 days or six (6) calendar months.

Comply

6,200

The “Minimum Password Age” SHALL be set to “Allow Changes Immediately”.

Comply

6,201

In the “Minimum Password Length” box, “At Least x Characters” SHALL be set to at least 8.

Comply

6,202

The “Password Uniqueness” SHALL be set to at least “remember 12 passwords”.

Comply

6,203

“Account lockout” SHALL be set after no more than 9 bad attempts, with a reset after no less than 30 minutes.

Comply

6,204

“Lockout Duration” SHALL be configurable across the range 15 to 90 minutes.

Comply

6,205

“Lockout Duration” SHALL be configurable by authorized Administrative personnel.

Comply

6,206

If the “Hours” option is used to limit the entity’s access, the “forcibly disconnect remote entities from server when logon hours expire” option SHALL be selected.

Comply

6,207

Passwords on new accounts, or following an entity password reset by an administrator, SHALL be set to expire immediately, requiring the entity to change the password at the first login.

Comply

6,208

An account SHALL NOT be created where the password is the same as the account UserID.

Comply

6,209

The system SHALL enforce at least the following password format structure: at least one numeric, at least one alpha character, and SHALL NOT contain the account UserID in the password.

Comply

6,210

Audit logging MUST be enabled for at least the following events: Logon and logoff - success and failure.

Comply

6,211

Audit logging MUST be enabled for at least the following events: File and object access – failure.

Comply

6,212

Audit logging MUST be enabled for at least the following events: Use of user rights – failure.

Comply

6,213

Audit logging MUST be enabled for at least the following events: User and Group Management - success and failure.

Comply

6,214

Audit logging MUST be enabled for at least the following events: Security Policy Changes - success and failure.

Comply

6,215

Audit logging MUST be enabled for at least the following events: System events - success and failure.

Comply

6,216

Audit logging MUST be enabled for at least the following events: Process tracking – failure.

Comply

6,217

Audit logging MUST be enabled for at least the following events: Additional events as needed .

Comply

6,218

Services and Subsystem Security

Comply

6,219

Only those services and subsystems that are absolutely required are allowed, all others SHALL be disabled.

Comply

6,220

Services or subsystems that SHALL be disabled are: Trivial File Transfer (TFTP).

Comply

6,221

Services or subsystems that SHALL be disabled are: Finger.

Comply

6,222

The following services SHALL NOT be used: Anonymous File Transfer Protocol (FTP), unless providing public information.

Comply

6,223

The following services SHALL NOT be used: Network Information System (NIS). However, NIS+ can be used.

Comply

6,224

The following services SHALL NOT be used: Network File System (NFS).

Comply

6,225

The following services SHALL NOT be used: Remote Access Service (RAS) Server.

Comply

6,226

The following services SHALL NOT be used: Berkeley Software Design (BSD™) r* commands.

Comply

6,227

The following services SHALL NOT be used: ECHO .

Comply

6,228

The following services SHALL NOT be used: Chargen.

Comply

6,229

FTP

Comply

6,230

If the FTP server service is needed, it SHALL be configured as follows: The appropriate notice SHALL be displayed upon connection.

Comply

6,231

If the FTP service needs to run on a system, it is recommended that it be assigned a complete disk partition as the FTP directory, rather than using a directory on a partition containing other information.

Comply

6,232

To help prevent denial of service attacks the FTP server MUST be configured for only a limited number of connections.

Comply

6,233

An FTP server SHALL display the appropriate proprietary banner and notice.

Comply

6,234

Hyper Text Transfer Protocol (HTTP) Server Service

Comply

6,235

To help prevent denial of service attacks the HTTP server MUST be configured for only a limited number of connections.

Comply

6,236

Redundancy and reliability have an impact on system availability and thus affect the security of the system. The following requirements apply to all located devices.

Comply

6,237

The device SHALL provide measures to combat common Denial of Service (DoS) attacks, notably TCP SYN flood and Smurf attacks.

Comply

6,238

The device MUST provide measures to mitigate Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks associated with control plane traffic.

Comply

6,239

The device SHALL support protection for control packets for each routing protocol against DDoS flood.

Comply

6,240

The device SHALL use separate queues for control packets for every control and routing protocol and implementation MUST be such that attacks on a particular type of control/routing traffic should not impact other control and routing traffic.

Comply

6,241

The device SHALL monitor unusual levels of control traffic and apply rate limits on per protocol basis.

Comply

6,242

In case of high CPU utilization, system elements SHALL ensure that authorized SNMP surveillance traffic and any other real time platform management interface have priority over all other traffic.
1   ...   24   25   26   27   28   29   30   31   32

Похожие:

Содержание iconСодержание содержание 1
Пояснительные записки, тематическое планирование и тексты учебных пособий Летней физико-математической школы. 2002 и 2003 гг

Содержание icon5410611008 нижневартовск 2013 содержание
Общие требования к первой (предквалификационной) и второй частям заявок (содержание, оформление, подача, изменение, отзыв) 15

Содержание icon5182012014 нижневартовск 2013 содержание
Общие требования к первой (предквалификационной) и второй частям заявок (содержание, оформление, подача, изменение, отзыв) 15

Содержание iconПамятка для родителей, имеющих право на муниципальные льготы за содержание...
В соответствии с решением Совета депутатов г. Мурманска от 26. 12. 2006 года №30-357 «Об организации дошкольного образования и родительской...

Содержание iconПамятка для родителей, имеющих право на муниципальные льготы за содержание...
В соответствии с решением Совета депутатов г. Мурманска от 26. 12. 2006 года №30-357 «Об организации дошкольного образования и родительской...

Содержание iconПравила оформления заявки на грант содержание заявки
Научное содержание нир, оформленное по образцу научной публикации (объемом до 15 машинописных страниц, через 1,5 интервала)

Содержание iconКурсовая работа тема: «Содержание договора и классификация его условий»
Неправильное составление договора или неполное содержание влечёт за собой проблемы различного характера

Содержание iconФормата Передачи Данных TransUnion (tutdf) январь 2016 г. Версия 03r Содержание Содержание 2
Разъяснения по выгрузке информации о прекращении банковской гарантии в иных, отличных от окончания срока гарантии случаях. 145

Содержание icon«Актуальные проблемы международного морского права»
Характеристики, структура и содержание Раздел Характеристики, структура и содержание учебной дисциплины

Содержание iconКонспект лекций Тема Сущность, содержание и цели маркетинговой деятельности
Суть и содержание понятия «маркетинг». Цели, задачи, объект и предмет маркетинга. Эволюция содержания маркетинга

Вы можете разместить ссылку на наш сайт:


Все бланки и формы на filling-form.ru




При копировании материала укажите ссылку © 2019
контакты
filling-form.ru

Поиск