Skip to content

Virtual Private Network (VPN) Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The VPN Gateway must use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts.

    To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor auth...
    Rule High Severity
  • SRG-NET-000145

    Group
  • SRG-NET-000147

    Group
  • SRG-NET-000147

    Group
  • The IPsec VPN Gateway must use anti-replay mechanisms for security associations.

    Anti-replay is an IPsec security mechanism at a packet level, which helps to avoid unwanted users from intercepting and modifying an ESP packet.
    Rule Medium Severity
  • SRG-NET-000148

    Group
  • SRG-NET-000164

    Group
  • The VPN Gateway, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. To meet this requirement, the information...
    Rule Medium Severity
  • SRG-NET-000165

    Group
  • The site-to-site VPN, when using PKI-based authentication for devices, must enforce authorized access to the corresponding private key.

    If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...
    Rule Medium Severity
  • SRG-NET-000166

    Group
  • SRG-NET-000166

    Group
  • The VPN Gateway must map the authenticated identity to the user account for PKI-based authentication.

    Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis. This re...
    Rule Medium Severity
  • SRG-NET-000168

    Group
  • The VPN Gateway must use FIPS-validated SHA-2 or higher hash function to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Although allowed by SP800-131Ar2 for some applications, SHA-1 is considered a compr...
    Rule Medium Severity
  • SRG-NET-000169

    Group
  • The VPN Gateway must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    Lack of authentication and identification enables non-organizational users to gain access to the network or possibly a VPN gateway that provides opportunity for intruders to compromise resources wi...
    Rule Medium Severity
  • SRG-NET-000205

    Group
  • The VPN Gateway must be configured to route sessions to an IDPS for inspection.

    Remote access devices, such as those providing remote access to network devices and information systems, which lack automated, capabilities increase risk and makes remote user access management dif...
    Rule Medium Severity
  • SRG-NET-000213

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules