Skip to content

Juniper SRX Services Gateway NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one uppercase character be used.

    Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisti...
    Rule Medium Severity
  • SRG-APP-000167-NDM-000255

    Group
  • For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one lowercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000168-NDM-000256

    Group
  • For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one numeric character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000169-NDM-000257

    Group
  • SRG-APP-000172-NDM-000259

    Group
  • The Juniper SRX Services Gateway must use the SHA256 or later protocol for password authentication for local accounts using password authentication (i.e., the root account and the account of last resort).

    Passwords must be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily comp...
    Rule High Severity
  • SRG-APP-000411-NDM-000330

    Group
  • SRG-APP-000411-NDM-000330

    Group
  • The Juniper SRX Services Gateway must securely configure SSHv2 FIPS 140-2/140-3 validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of maintenance and diagnostic communications for nonlocal maintenance sessions.

    To protect the integrity of nonlocal maintenance sessions, SSHv2 with HMAC algorithms for integrity checking must be configured. Nonlocal maintenance and diagnostic activities are activities cond...
    Rule High Severity
  • SRG-APP-000412-NDM-000331

    Group
  • SRG-APP-000412-NDM-000331

    Group
  • The Juniper SRX Services Gateway must use SSHv2 with privacy options to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions using SSH.

    To protect the confidentiality of nonlocal maintenance sessions when using SSH communications, SSHv2, AES ciphers, and key-exchange commands are configured. Nonlocal maintenance and diagnostic ac...
    Rule High Severity
  • SRG-APP-000412-NDM-000331

    Group
  • SRG-APP-000190-NDM-000267

    Group
  • The Juniper SRX Services Gateway must terminate a device management session after 10 minutes of inactivity, except to fulfill documented and validated mission requirements.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session. Quickly terminating an idle session also...
    Rule Medium Severity
  • SRG-APP-000190-NDM-000267

    Group
  • SRG-APP-000435-NDM-000315

    Group
  • The Juniper SRX Services Gateway must configure the control plane to protect against or limit the effects of common types of Denial of Service (DoS) attacks on the device itself by configuring applicable system options and internet-options.

    DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. Juniper SRX ...
    Rule Medium Severity
  • SRG-APP-000435-NDM-000315

    Group
  • The Juniper SRX Services Gateway must limit the number of sessions per minute to an organization-defined number for SSH to protect remote access management from unauthorized access.

    The rate-limit command limits the number of SSH session attempts allowed per minute which helps limit an attacker's ability to perform DoS attacks. The rate limit should be as restrictive as operat...
    Rule Medium Severity
  • SRG-APP-000435-NDM-000315

    Group
  • The Juniper SRX Services Gateway must implement service redundancy to protect against or limit the effects of common types of Denial of Service (DoS) attacks on the device itself.

    Service redundancy, may reduce the susceptibility to some DoS attacks. Organizations must consider the need for service redundancy in accordance with DoD policy. If service redundancy is required ...
    Rule Low Severity
  • SRG-APP-000516-NDM-000317

    Group
  • The Juniper SRX Services Gateway must be configured to use Junos 12.1 X46 or later to meet the minimum required version for DoD.

    Earlier versions of Junos may have reached the end of life cycle support by the vendor. Junos 12.1X46 is not a UC APL certified version, while 12.1X46 is UC APL Certified. The SRX with Junos 12.1X4...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    Group
  • SRG-APP-000516-NDM-000317

    Group
  • SRG-APP-000516-NDM-000317

    Group
  • For local accounts, the Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when local accounts are created.

    An authorized insider or individual who maliciously creates a local account could gain immediate access from a remote location to privileged information on a critical security device. Sending an al...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    Group
  • SRG-APP-000516-NDM-000317

    Group
  • The Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when accounts are disabled.

    An authorized insider or individual who maliciously disables a local account could gain immediate access from a remote location to privileged information on a critical security device. Sending an a...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    Group
  • SRG-APP-000516-NDM-000317

    Group
  • The Juniper SRX Services Gateway must generate an immediate alert message to the management console for account enabling actions.

    In order to detect and respond to events that affect network administrator accessibility and device processing, network devices must audit account enabling actions and, as required, notify the appr...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    Group
  • SRG-APP-000516-NDM-000317

    Group
  • For local logging, the Juniper SRX Services Gateway must generate a message to the system management console when a log processing failure occurs.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Without this alert, the security personnel may be unaware of an impending fai...
    Rule Low Severity
  • SRG-APP-000516-NDM-000317

    Group
  • In the event that communications with the events server is lost, the Juniper SRX Services Gateway must continue to queue log records locally.

    It is critical that when the network device is at risk of failing to process logs as required, it take action to mitigate the failure. Log processing failures include: software/hardware errors; fai...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    Group
  • The Juniper SRX Services Gateway must be configured to use an authentication server to centrally apply authentication and logon settings for remote and nonlocal access for device management.

    Centralized application (e.g., TACACS+, RADIUS) of authentication settings increases the security of remote and nonlocal access methods. This control is a particularly important protection against ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    Group
  • The Juniper SRX Services Gateway must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.

    Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is a particularly important protection against the insider threat. Audit...
    Rule High Severity
  • SRG-APP-000516-NDM-000317

    Group
  • The Juniper SRX Services Gateway must specify the order in which authentication servers are used.

    Specifying an authentication order implements an authentication, authorization, and accounting methods list to be used, thus allowing the implementation of redundant or backup AAA servers. These co...
    Rule Low Severity
  • SRG-APP-000516-NDM-000317

    Group
  • The Juniper SRX Services Gateway must detect the addition of components and issue a priority 1 alert to the ISSM and SA, at a minimum.

    The network device must automatically detect the installation of unauthorized software or hardware onto the device itself. Monitoring may be accomplished on an ongoing basis or by periodic monitori...
    Rule Low Severity
  • SRG-APP-000516-NDM-000317

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules