Skip to content

Juniper SRX Services Gateway NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000001-NDM-000200

    Group
  • SRG-APP-000026-NDM-000208

    Group
  • SRG-APP-000027-NDM-000209

    Group
  • SRG-APP-000028-NDM-000210

    Group
  • SRG-APP-000029-NDM-000211

    Group
  • SRG-APP-000319-NDM-000283

    Group
  • The Juniper SRX Services Gateway must automatically generate a log event when accounts are enabled.

    Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply...
    Rule Medium Severity
  • SRG-APP-000033-NDM-000212

    Group
  • SRG-APP-000343-NDM-000289

    Group
  • SRG-APP-000065-NDM-000214

    Group
  • For local accounts created on the device, the Juniper SRX Services Gateway must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Juniper SRX is unable to comply wi...
    Rule Low Severity
  • SRG-APP-000068-NDM-000215

    Group
  • SRG-APP-000091-NDM-000223

    Group
  • SRG-APP-000495-NDM-000318

    Group
  • The Juniper SRX Services Gateway must generate log records when changes are made to administrator privileges.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000499-NDM-000319

    Group
  • The Juniper SRX Services Gateway must generate log records when administrator privileges are deleted.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000503-NDM-000320

    Group
  • SRG-APP-000504-NDM-000321

    Group
  • The Juniper SRX Services Gateway must generate log records when privileged commands are executed.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000506-NDM-000323

    Group
  • The Juniper SRX Services Gateway must generate log records when concurrent logons from different workstations occur.

    Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...
    Rule Low Severity
  • SRG-APP-000101-NDM-000231

    Group
  • SRG-APP-000357-NDM-000293

    Group
  • SRG-APP-000360-NDM-000295

    Group
  • SRG-APP-000374-NDM-000299

    Group
  • The Juniper SRX Services Gateway must record time stamps for log records using Coordinated Universal Time (UTC).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. UTC is normally used in DoD; however, Greenwich Mean Time (GMT) may ...
    Rule Medium Severity
  • SRG-APP-000378-NDM-000302

    Group
  • SRG-APP-000516-NDM-000317

    Group
  • If the loopback interface is used, the Juniper SRX Services Gateway must protect the loopback interface with firewall filters for known attacks that may exploit this interface.

    The loopback interface is a logical interface and has no physical port. Since the interface and addresses ranges are well-known, this port must be filtered to protect the Juniper SRX from attacks.
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    Group
  • The Juniper SRX Services Gateway must have the number of rollbacks set to 5 or more.

    Backup of the configuration files allows recovery in case of corruption, misconfiguration, or catastrophic failure. The maximum number of rollbacks for the SRX is 50 while the default is 5 which is...
    Rule Low Severity
  • SRG-APP-000373-NDM-000298

    Group
  • SRG-APP-000516-NDM-000336

    Group
  • The Juniper SRX Services Gateway must be configured to use an authentication server to centrally manage authentication and logon settings for remote and nonlocal access.

    Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is a particularly important protection against the insider threat. Audit...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    Group
  • SRG-APP-000142-NDM-000245

    Group
  • SRG-APP-000142-NDM-000245

    Group
  • SRG-APP-000142-NDM-000245

    Group
  • SRG-APP-000142-NDM-000245

    Group
  • SRG-APP-000142-NDM-000245

    Group
  • SRG-APP-000142-NDM-000245

    Group
  • The Juniper SRX Services Gateway must ensure TCP forwarding is disabled for SSH to prevent unauthorized access.

    Use this configuration option to prevent a user from creating an SSH tunnel over a CLI session to the Juniper SRX via SSH. This type of tunnel could be used to forward TCP traffic, bypassing any fi...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    Group
  • SRG-APP-000156-NDM-000250

    Group
  • The Juniper SRX Services Gateway must implement replay-resistant authentication mechanisms for network access to privileged accounts.

    A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...
    Rule Medium Severity
  • SRG-APP-000164-NDM-000252

    Group
  • SRG-APP-000166-NDM-000254

    Group
  • For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by setting the password change type to character sets.

    Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisti...
    Rule Medium Severity
  • SRG-APP-000166-NDM-000254

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules