Device and Application Security Policy Recommendations¶
It is important that application developers and manufacturers understand the complexities related to the configuration options for various cybersecurity controls. The tables below provides examples of cybersecurity configuration options and in many cases recommendations for the optimal option. Each of these policy item details has been taken from the FHWA ITS2P program recommendations.
Specifies the minimum length a password should have for utilization within ITS equipment for user authentication, admin authentication, etc...
12 characters
Minimum Password Quality
Specifies the minimum number of password quality categories that need to be enforced, which determine password characteristic requirements. The chosen password should also be checked against a blacklist of unacceptable passwords, which contains previous breach corpuses, dictionary words, and specific words that users are likely to choose.
None
Device Lockout Timeout
Specifies the maximum amount of time that may pass before a device is locked from the software automatically.
5 minutes
Maximum Number of Failed Attempts
Specifies the maximum number of times password entry may be failed by a user before being barred from attempting to log into their account and being asked to reset their password.
3
Enable Credential Recovery
Provides technicians with the option to reset or recover credentials.
True
Maximum Days Before Password Expiration
Mandates routine password changes by specifying maximum days a password can remain active until it must be changed.
60
Minimum Time Between Credential Recovery Attempts
Represents the minimum number of days that must pass before a password can be recovered again if it has been recently reset.
AIDE takes a snapshot of the current filesystem’s state noting register hashes, modification times, and other data defined by administrators. A database is then built based on this snapshot and is stored to use in future integrity checks against the system’s status. AIDE will automatically report any discrepancies between versions found during integrity checks to administrators.
True
Enable Version Control
Allows for data recovery or rollback in case of breaches or data loss incidents.
Require re-authentication for Privilege Escalation (Linux only)
−Users will be required to reauthenticate to access higher-privilege resources or tasks. Prevent automated processes from being able to utilize elevated privileges.
True
sudo Authentication Timeout (Linux only)
−Establishes a timeout that reduces the window of opportunity for unauthorized privileged access by unauthorized users.
Manage a host-based firewall or port-filtering tool on end-user devices, with a default-deny rule that drops all traffic except those services and ports that are explicitly allowed.
An over-used key can encrypt too much data making it vulnerable to cracking, especially using old symmetric algorithms. High volumes of data can be exposed in the event of a key becoming compromised, which can be countered with frequent key rotations,
30 days
Audit Key Logging
Key lifecycle is logged to identify instances of key compromise.
True
Multi Factor Authentication Key Access
Require multi-factor authentication to access keys. Important for keys that have high privilege such as admin.
True
Configure Key Size
−Larger keys offer longer protection at the cost of performance. Configuration is based on input passed in as an integer which determines the bit size of the key.
Authorize users based on the connection type provided.
True
Authorize Remote Access Based on Time of Day
Authorize remote access for users based on the time of day. Ex: Certain users will only have remote access during an organization’s business/working hours.
True
Authorize and Verify Caller ID
−Specify the telephone number that the user must be calling from in order to establish a successful connection. Requires hardware to detect the number that the user is calling from.
None
Enable Callback Options
Allows users to connect remotely and without use of callback.
True
Assign Static IP Address for Remote Access
−Assign a unique IP address to each user that connects to an ITS remotely.
None
Assign Duration of Session
−Disconnect users after a specified amount of idle time has passed.
45 minutes
Assign Maximum Session
Disconnect users after an allotted time.
60 minutes
Configure Encryption Parameters
−Permit or define VPN connections to the remote server.
−Encrypt data before sending to destinations endpoints and only decrypt data using a public-private key pair.
True
Enable Authentication Endpoints
−Access to data endpoints should be configured to require authentication in order to further secure data transportation.
None
Enable Secure Protocols
−Provide a secure protocol to perform encrypted communications. SSL, TLS, HTTPs. HTTPs are the most appropriate protocol to implement for this usage case, but other options can be selected based on administrator discretion.