STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Dell OS10 Switch NDM Security Technical Implementation Guide

Version

V1R1

Release Date

Dec 11, 2024

SCAP Benchmark ID

Dell_OS10_Switch_NDM_STIG

Total Checks

39

Tags

network
CAT I: 14CAT II: 25CAT III: 0

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (39)

V-269768MEDIUMThe Dell OS10 Switch must limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.V-269769HIGHThe Dell OS10 Switch must be configured to assign appropriate user roles or access levels to authenticated users.V-269770MEDIUMThe Dell OS10 Switch must enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.V-269771MEDIUMThe Dell OS10 Switch must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.V-269772MEDIUMThe Dell OS10 device must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the device.V-269773MEDIUMThe Dell OS10 Switch must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by nonrepudiation.V-269774MEDIUMThe Dell OS10 Switch must initiate session auditing upon startup.V-269775MEDIUMThe Dell OS10 Switch must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.V-269776HIGHThe Dell OS10 Switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.V-269777HIGHThe Dell OS10 Switch must be configured to disable the Bash shell.V-269778MEDIUMThe Dell OS10 Switch must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.V-269779HIGHThe Dell OS10 Switch must be configured to use DOD PKI as multifactor authentication (MFA) for interactive logins.V-269780MEDIUMThe Dell OS10 Switch must implement replay-resistant authentication mechanisms for network access to privileged accounts.V-269781MEDIUMThe Dell OS10 Switch must enforce a minimum 15-character password length.V-269782MEDIUMThe Dell OS10 Switch must enforce password complexity by requiring that at least one uppercase character be used.V-269783MEDIUMThe Dell OS10 Switch must enforce password complexity by requiring that at least one lowercase character be used.V-269784MEDIUMThe Dell OS10 Switch must enforce password complexity by requiring that at least one numeric character be used.V-269785MEDIUMThe Dell OS10 Switch must enforce password complexity by requiring that at least one special character be used.V-269786HIGHThe Dell OS10 Switch must be configured to use DOD-approved OCSP responders or CRLs to validate certificates used for PKI-based authentication.V-269787HIGHThe Dell OS10 Switch, for PKI-based authentication, must be configured to map validated certificates to unique user accounts.V-269788HIGHThe Dell OS10 Switch must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.V-269789HIGHThe Dell OS10 Switch must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements.V-269790HIGHThe Dell OS10 Switch must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.V-269791MEDIUMThe Dell OS10 Switch must generate an immediate real-time alert of all audit failure events requiring real-time alerts.V-269793MEDIUMThe Dell OS10 Switch must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).V-269794MEDIUMThe Dell OS10 Switch must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.V-269795MEDIUMThe Dell OS10 Switch must prohibit the use of cached authenticators after an organization-defined time period.V-269796HIGHThe Dell OS10 Switch must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.V-269797HIGHThe Dell OS10 Switch must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.V-269798MEDIUMThe Dell OS10 Switch must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.V-269799MEDIUMThe application must install security-relevant firmware updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).V-269800MEDIUMThe Dell OS10 Switch must generate log records for a locally developed list of auditable events.V-269801MEDIUMThe Dell OS10 Switch must enforce access restrictions associated with changes to the system components.V-269802MEDIUMThe Dell OS10 Switch must obtain its public key certificates from an appropriate certificate policy through an approved service provider.V-269803HIGHThe Dell OS10 Switch must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).V-269804HIGHThe Dell OS10 Switch must be running an operating system release that is currently supported by Dell.V-269805MEDIUMThe Dell OS10 Switch must not have any default manufacturer passwords when deployed.V-270643HIGHThe Dell OS10 Switch must be configured to use at least two authentication servers for the purpose of authenticating users prior to granting administrative access.V-270644MEDIUMThe Dell OS10 Switch must be configured to synchronize internal information system clocks using redundant authoritative time sources.