Skip to content

Virtual Private Network (VPN) Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000019

    Group
  • The VPN Gateway must ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.

    Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth ...
    Rule Medium Severity
  • SRG-NET-000041

    Group
  • The Remote Access VPN Gateway and/or client must display the Standard Mandatory DOD Notice and Consent Banner before granting remote access to the network.

    Display of a standardized and approved use notification before granting access to the network ensures privacy and security notification verbiage used is consistent with applicable federal laws, Exe...
    Rule Medium Severity
  • SRG-NET-000042

    Group
  • SRG-NET-000053

    Group
  • The VPN Gateway must limit the number of concurrent sessions for user accounts to 1 or to an organization-defined number.

    VPN gateway management includes the ability to control the number of users and user sessions that utilize a VPN gateway. Limiting the number of allowed users and sessions per user is helpful in lim...
    Rule Medium Severity
  • SRG-NET-000062

    Group
  • The TLS VPN Gateway must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during transmission for remote access connections.

    Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol. NIST SP 8...
    Rule High Severity
  • SRG-NET-000063

    Group
  • The remote access VPN Gateway must use a digital signature generated using FIPS-validated algorithms and an approved hash function to protect the integrity of TLS remote access sessions.

    Without integrity protection, unauthorized changes may be made to the log files and reliable forensic analysis and discovery of the source of malicious system activity may be degraded. Remote acce...
    Rule Medium Severity
  • SRG-NET-000063

    Group
  • SRG-NET-000074

    Group
  • The IPSec VPN must be configured to use a Diffie-Hellman (DH) Group of 16 or greater for Internet Key Exchange (IKE) Phase 1.

    Use of an approved DH algorithm ensures the IKE (Phase 1) proposal uses FIPS-validated key management techniques and processes in the production, storage, and control of private/secret cryptographi...
    Rule High Severity
  • SRG-NET-000075

    Group
  • If the site-to-site VPN implementation uses L2TP, L2TPv3 sessions must be authenticated prior to transporting traffic.

    L2TPv3 sessions can be used to transport layer-2 protocols across an IP backbone. These protocols were intended for link-local scope only and are therefore less defended and not as well-known. As s...
    Rule Medium Severity
  • SRG-NET-000077

    Group
  • The VPN Gateway must generate log records containing information to establish what type of events occurred.

    Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. VPN gateways often have a separate au...
    Rule Low Severity
  • SRG-NET-000078

    Group
  • The VPN Gateway must generate log records containing information to establish when (date and time) the events occurred.

    Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. VPN gateways often have a separate audit log for ...
    Rule Low Severity
  • SRG-NET-000079

    Group
  • The VPN Gateway must generate log records containing information that establishes the identity of any individual or process associated with the event.

    Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility...
    Rule Medium Severity
  • SRG-NET-000088

    Group
  • SRG-NET-000089

    Group
  • The VPN Gateway must generate log records containing information to establish the source of the events.

    Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment...
    Rule Low Severity
  • SRG-NET-000091

    Group
  • SRG-NET-000098

    Group
  • The VPN Gateway must protect log information from unauthorized read access if all or some of this data is stored locally.

    Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity th...
    Rule Low Severity
  • SRG-NET-000099

    Group
  • SRG-NET-000100

    Group
  • The VPN Gateway must protect audit information from unauthorized deletion when stored locally.

    If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit...
    Rule Medium Severity
  • SRG-NET-000132

    Group
  • SRG-NET-000132

    Group
  • The IPsec VPN Gateway must use IKEv2 for IPsec VPN security associations.

    In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable...
    Rule Medium Severity
  • SRG-NET-000132

    Group
  • SRG-NET-000132

    Group
  • For site-to-site VPN implementations, the L2TP protocol must be blocked or denied at the security boundary with the private network so unencrypted L2TP packets cannot traverse into the private network of the enclave.

    Unlike GRE (a simple encapsulating header) L2TP is a full-fledged communications protocol with control channel, data channels, and a robust command structure. In addition to PPP, other link layer t...
    Rule Medium Severity
  • SRG-NET-000138

    Group
  • The VPN Gateway must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...
    Rule Medium Severity
  • SRG-NET-000140

    Group
  • The VPN Gateway must use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts.

    To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor auth...
    Rule High Severity
  • SRG-NET-000145

    Group
  • SRG-NET-000147

    Group
  • SRG-NET-000147

    Group
  • The IPsec VPN Gateway must use anti-replay mechanisms for security associations.

    Anti-replay is an IPsec security mechanism at a packet level, which helps to avoid unwanted users from intercepting and modifying an ESP packet.
    Rule Medium Severity
  • SRG-NET-000148

    Group
  • SRG-NET-000164

    Group
  • The VPN Gateway, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. To meet this requirement, the information...
    Rule Medium Severity
  • SRG-NET-000165

    Group
  • The site-to-site VPN, when using PKI-based authentication for devices, must enforce authorized access to the corresponding private key.

    If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules