STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Fortinet FortiGate Firewall NDM Security Technical Implementation Guide

Version

V1R5

Release Date

Nov 19, 2025

SCAP Benchmark ID

FN_FortiGate_Firewall_NDM_STIG

Total Checks

60

Tags

network
CAT I: 9CAT II: 51CAT III: 0

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (60)

V-234162MEDIUMThe FortiGate device must automatically audit account creation.V-234163MEDIUMThe FortiGate device must automatically audit account modification.V-234164MEDIUMThe FortiGate device must automatically audit account removal actions.V-234165MEDIUMThe FortiGate device must have only one local account to be used as the account of last resort in the event the authentication server is unavailable.V-234166MEDIUMThe FortiGate device must allow full access to only those individuals or roles designated by the ISSM.V-234167MEDIUMThe FortiGate device must audit the execution of privileged functions.V-234168MEDIUMThe FortiGate device must enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.V-234169MEDIUMThe FortiGate device must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.V-234170MEDIUMThe FortiGate device must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.V-234171MEDIUMThe FortiGate device must log all user activity.V-234172MEDIUMThe FortiGate device must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.V-234173MEDIUMThe FortiGate device must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.V-234174MEDIUMThe FortiGate device must generate audit records when successful/unsuccessful logon attempts occur.V-234175MEDIUMThe FortiGate device must generate audit records for privileged activities or other system-level access.V-234176MEDIUMThe FortiGate device must generate audit records showing starting and ending time for administrator access to the system.V-234177MEDIUMThe FortiGate device must generate audit records when concurrent logons from different workstations occur.V-234178MEDIUMThe FortiGate device must generate audit records containing information that establishes the identity of any individual or process associated with the event.V-234179MEDIUMThe FortiGate device must generate audit records containing the full-text recording of privileged commands.V-234180MEDIUMThe FortiGate device must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.V-234181MEDIUMThe FortiGate device must off-load audit records on to a different system or media than the system being audited.V-234182MEDIUMThe FortiGate device must generate an immediate real-time alert of all audit failure events requiring real-time alerts.V-234183MEDIUMThe FortiGate device must synchronize internal information system clocks using redundant authoritative time sources.V-234184MEDIUMThe FortiGate device must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).V-234185MEDIUMThe FortiGate device must protect audit information from unauthorized deletion.V-234186MEDIUMThe FortiGate device must protect audit tools from unauthorized access.V-234187MEDIUMThe FortiGate device must protect audit tools from unauthorized modification.V-234188MEDIUMThe FortiGate device must prohibit installation of software without explicit privileged status.V-234189MEDIUMThe FortiGate device must enforce access restrictions associated with changes to device configuration.V-234190MEDIUMThe FortiGate device must limit privileges to change the software resident within software libraries.V-234191MEDIUMThe FortiGate device must enforce access restrictions associated with changes to the system components.V-234192MEDIUMThe FortiGate device must use LDAP for authentication.V-234193HIGHThe FortiGate device must be running an operating system release that is currently supported by the vendor.V-234194MEDIUMThe FortiGate device must generate log records for a locally developed list of auditable events.V-234195MEDIUMThe FortiGate device must conduct backups of system-level information contained in the information system when changes occur.V-234196MEDIUMThe FortiGate device must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.V-234197MEDIUMFortiGate devices performing maintenance functions must restrict use of these functions to authorized personnel only.V-234198MEDIUMThe FortiGate device must use DoD-approved Certificate Authorities (CAs) for public key certificates.V-234199HIGHThe FortiGate device must prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services.V-234200MEDIUMThe FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts.V-234201MEDIUMThe FortiGate device must authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).V-234202MEDIUMThe FortiGate device must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.V-234203MEDIUMThe FortiGate device must enforce a minimum 15-character password length.V-234204MEDIUMThe FortiGate device must enforce password complexity by requiring that at least one uppercase character be used.V-234205MEDIUMThe FortiGate device must enforce password complexity by requiring that at least one lowercase character be used.V-234206MEDIUMThe FortiGate device must enforce password complexity by requiring at least one numeric character be used.V-234207MEDIUMThe FortiGate device must enforce password complexity by requiring that at least one special character be used.V-234208HIGHThe FortiGate device must use LDAPS for the LDAP connection.V-234209MEDIUMThe FortiGate device must not have any default manufacturer passwords when deployed.V-234210HIGHThe FortiGate device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.V-234211HIGHThe FortiGate devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.V-234212HIGHThe FortiGate device must implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.V-234213MEDIUMThe FortiGate device must terminate idle sessions after 10 minutes of inactivity.V-234214HIGHThe FortiGate device must terminate idle sessions after 10 minutes of inactivity.V-234215MEDIUMThe FortiGate device must generate unique session identifiers using a FIPS 140-2-approved random number generator.V-234216HIGHThe FortiGate device must only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).V-234217MEDIUMThe FortiGate device must protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.V-234218HIGHThe FortiGate device must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the ISSO.V-234219MEDIUMThe FortiGate device must limit the number of logon and user sessions.V-234220MEDIUMThe FortiGate device must only install patches or updates that are validated by the vendor via digital signature or hash.V-234221MEDIUMThe FortiGate device must require that when a password is changed, the characters are changed in at least eight of the positions within the password.