STIGQter STIGQter: STIG Summary: F5 BIG-IP Device Management 11.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The BIG-IP appliance must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.

DISA Rule

SV-217396r557520_rule

Vulnerability Number

V-217396

Group Title

SRG-APP-000142-NDM-000245

Rule Version

F5BI-DM-000093

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the BIG-IP appliance to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

Check Contents

Verify the BIG-IP appliance prohibits the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

Navigate to the BIG-IP System manager >> System >> Services.

Verify no unauthorized services are configured or running.

If any unnecessary or nonsecure functions are permitted, this is a finding.

Vulnerability Number

V-217396

Documentable

False

Rule Version

F5BI-DM-000093

Severity Override Guidance

Verify the BIG-IP appliance prohibits the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

Navigate to the BIG-IP System manager >> System >> Services.

Verify no unauthorized services are configured or running.

If any unnecessary or nonsecure functions are permitted, this is a finding.

Check Content Reference

M

Target Key

4036

Comments