Skip to content

Palo Alto Networks ALG Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Palo Alto Networks security platform must use a Vulnerability Protection Profile that blocks any critical, high, or medium threats.

    If the network does not provide safeguards against DoS attacks, network resources may be unavailable to users. Installation of content filtering gateways and application-layer firewalls at key bo...
    Rule Medium Severity
  • SRG-NET-000364-ALG-000122

    Group
  • The Palo Alto Networks security platform must only allow incoming communications from organization-defined authorized sources forwarded to organization-defined authorized destinations.

    Unrestricted traffic may contain malicious traffic that poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth a...
    Rule Medium Severity
  • SRG-NET-000370-ALG-000125

    Group
  • SRG-NET-000383-ALG-000135

    Group
  • The Palo Alto Networks security platform must be configured to integrate with a system-wide intrusion detection system.

    Without coordinated reporting between separate devices, it is not possible to identify the true scale and possible target of an attack. Integration of the Palo Alto Networks security platform with...
    Rule Low Severity
  • SRG-NET-000384-ALG-000136

    Group
  • SRG-NET-000385-ALG-000137

    Group
  • The Palo Alto Networks security platform must generate a log record when unauthorized network services are detected.

    Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or serve as malicious rogues for valid services. Examples of network serv...
    Rule Medium Severity
  • SRG-NET-000385-ALG-000138

    Group
  • SRG-NET-000390-ALG-000139

    Group
  • SRG-NET-000391-ALG-000140

    Group
  • The Palo Alto Networks security platform must continuously monitor outbound communications traffic crossing internal security boundaries.

    If outbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output from application and traffic monitoring serves as input to continuous mo...
    Rule Medium Severity
  • SRG-NET-000392-ALG-000142

    Group
  • SRG-NET-000392-ALG-000143

    Group
  • SRG-NET-000392-ALG-000147

    Group
  • The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software that allows unauthorized nonprivileged access is detected.

    Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this delay may result in the loss or compromise of information. The device gener...
    Rule Medium Severity
  • SRG-NET-000392-ALG-000148

    Group
  • SRG-NET-000392-ALG-000149

    Group
  • The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.

    Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this delay may result in the loss or compromise of information. The device gener...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules