Symantec ProxySG ALG Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000166-ALG-000101
<GroupDescription></GroupDescription>Group -
Symantec ProxySG, when configured for reverse proxy/WAF services and providing PKI-based user authentication intermediary services, must map the client certificate to the authentication server store.
<VulnDiscussion>Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure on...Rule Medium Severity -
SRG-NET-000345-ALG-000099
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing user authentication intermediary services using PKI-based user authentication must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
<VulnDiscussion>Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer autho...Rule Medium Severity -
SRG-NET-000349-ALG-000106
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing user authentication intermediary services must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.
<VulnDiscussion>Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protoc...Rule Medium Severity -
SRG-NET-000273-ALG-000129
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule High Severity -
SRG-NET-000510-ALG-000111
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing forward proxy encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...Rule Medium Severity -
SRG-NET-000510-ALG-000025
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing reverse proxy encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...Rule Medium Severity -
SRG-NET-000510-ALG-000040
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing reverse proxy encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...Rule Medium Severity -
SRG-NET-000510-ALG-000111
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing reverse proxy encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...Rule Medium Severity -
SRG-NET-000230-ALG-000113
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must use Transport Layer Security (TLS) to protect the authenticity of communications sessions.
<VulnDiscussion>Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...Rule High Severity -
SRG-NET-000355-ALG-000117
<GroupDescription></GroupDescription>Group -
If reverse proxy is used for validating and restricting certs from external entities, and this function is required by the SSP, Symantec ProxySG providing user authentication intermediary services using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of protected sessions.
<VulnDiscussion>Non-DoD-approved PKIs have not been evaluated to ensure they have security controls and identity vetting procedures in place ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.