Virtual Private Network (VPN) Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000079
Group -
The VPN Gateway must generate log records containing information that establishes the identity of any individual or process associated with the event.
Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility...Rule Medium Severity -
SRG-NET-000088
Group -
SRG-NET-000089
Group -
The VPN Gateway must generate log records containing information to establish the source of the events.
Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment...Rule Low Severity -
SRG-NET-000091
Group -
SRG-NET-000098
Group -
The VPN Gateway must protect log information from unauthorized read access if all or some of this data is stored locally.
Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity th...Rule Low Severity -
SRG-NET-000099
Group -
SRG-NET-000100
Group -
The VPN Gateway must protect audit information from unauthorized deletion when stored locally.
If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit...Rule Medium Severity -
SRG-NET-000132
Group -
SRG-NET-000132
Group -
The IPsec VPN Gateway must use IKEv2 for IPsec VPN security associations.
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable...Rule Medium Severity -
SRG-NET-000132
Group -
SRG-NET-000132
Group -
For site-to-site VPN implementations, the L2TP protocol must be blocked or denied at the security boundary with the private network so unencrypted L2TP packets cannot traverse into the private network of the enclave.
Unlike GRE (a simple encapsulating header) L2TP is a full-fledged communications protocol with control channel, data channels, and a robust command structure. In addition to PPP, other link layer t...Rule Medium Severity -
SRG-NET-000138
Group -
The VPN Gateway must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...Rule Medium Severity -
SRG-NET-000140
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.