STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Riverbed NetIM OS Security Technical Implementation Guide

V-275617

CAT II (Medium)

Ubuntu OS must restrict SSH access to allow only NetIM internal communication.

Rule ID

SV-275617r1148290_rule

STIG

Riverbed NetIM OS Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-002418CCI-002420CCI-002422

Discussion

Remote access is not authorized for connection to the Riverbed NetIM shell to minimize and deter system administrators from accessing the shell, bash commands, or root account remotely. Though the device is not critical to the infrastructure, compromise of this device at the OS level could lead to compromise of other devices on the network.

Check Content

Verify firewall rule exists to restrict SSH to allow specific IP addresses only by using the following commands:

$ sudo ufw status

If a firewall rule does not exist to restrict port 22 to allow specific IP addresses and deny all other address, this is a finding.

Fix Text

Deny all other SSH connections and allow SSH connections from a specific IP address by using the following commands. Allow from NetIM core/worker(s)/manager in a base configuration with UFW allow.  

$ sudo ufw deny from any to any port 22
$ sudo ufw allow from <NETIM_IP_ADDRESS node list> to any port 22

Where NETIM_IP_ADDRESS list are the list of NETIM IP addresses for all nodes.

Note: This will restrict system admins to use of the CONSOLE mechanism available depending on the Virtual Platform being used.