A10 Networks ADC ALG Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
To protect against data mining, the A10 Networks ADC must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000318-ALG-000151
<GroupDescription></GroupDescription>Group -
To protect against data mining, the A10 Networks ADC must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000318-ALG-000152
<GroupDescription></GroupDescription>Group -
To protect against data mining, the A10 Networks ADC providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000319-ALG-000015
<GroupDescription></GroupDescription>Group -
To protect against data mining, the A10 Networks ADC providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000319-ALG-000020
<GroupDescription></GroupDescription>Group -
SRG-NET-000319-ALG-000153
<GroupDescription></GroupDescription>Group -
To protect against data mining, the A10 Networks ADC providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000355-ALG-000117
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC being used for TLS encryption and decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions.
<VulnDiscussion>Non-DoD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in p...Rule Medium Severity -
SRG-NET-000362-ALG-000112
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must protect against TCP and UDP Denial of Service (DoS) attacks by employing Source-IP based connection-rate limiting.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation ...Rule High Severity -
SRG-NET-000362-ALG-000120
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.
<VulnDiscussion>Although maintaining high availability is normally an operational consideration, load balancing is also a useful strategy in ...Rule Medium Severity -
SRG-NET-000362-ALG-000126
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must enable DDoS filters.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation ...Rule Medium Severity -
SRG-NET-000364-ALG-000122
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC, when used to load balance web applications, must examine incoming user requests against the URI White Lists.
<VulnDiscussion>Unrestricted traffic may contain malicious traffic, which poses a threat to an enclave or to other connected networks. Additi...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.