Symantec ProxySG ALG Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000166-ALG-000101
<GroupDescription></GroupDescription>Group -
Symantec ProxySG, when configured for reverse proxy/WAF services and providing PKI-based user authentication intermediary services, must map the client certificate to the authentication server store.
<VulnDiscussion>Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure on...Rule Medium Severity -
SRG-NET-000345-ALG-000099
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing user authentication intermediary services using PKI-based user authentication must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
<VulnDiscussion>Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer autho...Rule Medium Severity -
SRG-NET-000349-ALG-000106
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing user authentication intermediary services must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.
<VulnDiscussion>Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protoc...Rule Medium Severity -
SRG-NET-000273-ALG-000129
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule High Severity -
SRG-NET-000510-ALG-000111
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing forward proxy encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.