Juniper SRX SG NDM Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Juniper SRX Services Gateway must be configured with only one local user account to be used as the account of last resort.
<VulnDiscussion>Without centralized management, credentials for some network devices will be forgotten, leading to delays in administration, ...Rule Medium Severity -
SRG-APP-000156-NDM-000250
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must implement replay-resistant authentication mechanisms for network access to privileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule Medium Severity -
SRG-APP-000164-NDM-000252
<GroupDescription></GroupDescription>Group -
For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce a minimum 15-character password length.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-APP-000166-NDM-000254
<GroupDescription></GroupDescription>Group -
For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by setting the password change type to character sets.
<VulnDiscussion>Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...Rule Medium Severity -
SRG-APP-000166-NDM-000254
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate log records when changes are made to administrator privileges.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Low Severity -
SRG-APP-000499-NDM-000319
<GroupDescription></GroupDescription>Group -
SRG-APP-000026-NDM-000208
<GroupDescription></GroupDescription>Group -
For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account creation events.
<VulnDiscussion>Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing...Rule Medium Severity -
SRG-APP-000027-NDM-000209
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate log records when administrator privileges are deleted.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Low Severity -
SRG-APP-000503-NDM-000320
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate log records when logon events occur.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Low Severity -
SRG-APP-000504-NDM-000321
<GroupDescription></GroupDescription>Group -
For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account modification events.
<VulnDiscussion>Upon gaining access to a network device, an attacker will often first attempt to modify existing accounts to increase/decreas...Rule Medium Severity -
SRG-APP-000028-NDM-000210
<GroupDescription></GroupDescription>Group -
For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account disabling events.
<VulnDiscussion>When device management accounts are disabled, user or service accessibility may be affected. Auditing also ensures authorized...Rule Medium Severity -
SRG-APP-000029-NDM-000211
<GroupDescription></GroupDescription>Group -
For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account removal events.
<VulnDiscussion>Auditing account removal actions will support account management procedures. When device management accounts are terminated, ...Rule Medium Severity -
SRG-APP-000319-NDM-000283
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must automatically generate a log event when accounts are enabled.
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestab...Rule Medium Severity -
SRG-APP-000033-NDM-000212
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate log records when privileged commands are executed.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Low Severity -
SRG-APP-000506-NDM-000323
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must enforce the assigned privilege level for each administrator and authorizations for access to all commands by assigning a login class to all AAA-authenticated users.
<VulnDiscussion>To mitigate the risk of unauthorized privileged access to the device, administrators must be assigned only the privileges nee...Rule Medium Severity -
SRG-APP-000343-NDM-000289
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate a log event when privileged commands are executed.
<VulnDiscussion>Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external enti...Rule Low Severity -
SRG-APP-000065-NDM-000214
<GroupDescription></GroupDescription>Group -
For local accounts created on the device, the Juniper SRX Services Gateway must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Low Severity -
SRG-APP-000068-NDM-000215
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must display the Standard Mandatory DoD Notice and Consent Banner before granting access.
<VulnDiscussion>Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notifi...Rule Low Severity -
SRG-APP-000091-NDM-000223
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate log records when successful attempts to configure the device and use commands occur.
<VulnDiscussion>Without generating log records, it would be difficult to establish, correlate, and investigate the events relating to an inci...Rule Low Severity -
SRG-APP-000495-NDM-000318
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate log records when concurrent logons from different workstations occur.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Low Severity -
SRG-APP-000101-NDM-000231
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate log records containing the full-text recording of privileged commands.
<VulnDiscussion>Reconstruction of harmful events or forensic analysis is not possible if log records do not contain enough information. Org...Rule Low Severity -
SRG-APP-000357-NDM-000293
<GroupDescription></GroupDescription>Group -
For local log files, the Juniper SRX Services Gateway must allocate log storage capacity in accordance with organization-defined log record storage requirements so that the log files do not grow to a size that causes operational issues.
<VulnDiscussion>In order to ensure network devices have a sufficient storage capacity in which to write the logs, they need to be able to all...Rule Medium Severity -
SRG-APP-000360-NDM-000295
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate an immediate system alert message to the management console when a log processing failure is detected.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Witho...Rule Medium Severity -
SRG-APP-000374-NDM-000299
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must record time stamps for log records using Coordinated Universal Time (UTC).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Medium Severity -
SRG-APP-000378-NDM-000302
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must implement logon roles to ensure only authorized roles are allowed to install software and updates.
<VulnDiscussion>Allowing anyone to install software, without explicit privileges, creates the risk that untested or potentially malicious sof...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
If the loopback interface is used, the Juniper SRX Services Gateway must protect the loopback interface with firewall filters for known attacks that may exploit this interface.
<VulnDiscussion>The loopback interface is a logical interface and has no physical port. Since the interface and addresses ranges are well-kno...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.