Skip to content

A10 Networks ADC ALG Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000077-ALG-000046

    Group
  • SRG-NET-000088-ALG-000054

    Group
  • SRG-NET-000131-ALG-000085

    Group
  • The A10 Networks ADC must not have unnecessary scripts installed.

    Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of these functions and services are installed and enabled by default. The org...
    Rule Medium Severity
  • SRG-NET-000131-ALG-000086

    Group
  • SRG-NET-000132-ALG-000087

    Group
  • To protect against data mining, the A10 Networks ADC providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.

    Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational databases may result in...
    Rule Medium Severity
  • SRG-NET-000164-ALG-000100

    Group
  • SRG-NET-000202-ALG-000124

    Group
  • The A10 Networks ADC must not have any unnecessary or unapproved virtual servers configured.

    A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential and approved are allowed. A virtual server is an instance where the de...
    Rule Medium Severity
  • SRG-NET-000273-ALG-000129

    Group
  • The A10 Networks ADC, when used to load balance web applications, must strip HTTP response headers.

    Providing too much information in error messages risks compromising the data and security of the application and system. HTTP response headers can disclose vulnerabilities about a web server. This ...
    Rule Medium Severity
  • SRG-NET-000273-ALG-000129

    Group
  • SRG-NET-000318-ALG-000014

    Group
  • SRG-NET-000318-ALG-000151

    Group
  • To protect against data mining, the A10 Networks ADC must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.

    Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unaut...
    Rule Medium Severity
  • SRG-NET-000318-ALG-000152

    Group
  • To protect against data mining, the A10 Networks ADC providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.

    Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unaut...
    Rule Medium Severity
  • SRG-NET-000319-ALG-000015

    Group
  • To protect against data mining, the A10 Networks ADC providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

    Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational databases may result in...
    Rule Medium Severity
  • SRG-NET-000319-ALG-000020

    Group
  • SRG-NET-000319-ALG-000153

    Group
  • SRG-NET-000355-ALG-000117

    Group
  • The A10 Networks ADC being used for TLS encryption and decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions.

    Non-DoD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DoD systems to rely on the identity assert...
    Rule Medium Severity
  • SRG-NET-000362-ALG-000112

    Group
  • SRG-NET-000362-ALG-000120

    Group
  • The A10 Networks ADC must implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.

    Although maintaining high availability is normally an operational consideration, load balancing is also a useful strategy in mitigating network-based DoS attacks. If the network does not provide sa...
    Rule Medium Severity
  • SRG-NET-000362-ALG-000126

    Group
  • The A10 Networks ADC must enable DDoS filters.

    If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation of content filtering gateways and application layer firewalls at key bou...
    Rule Medium Severity
  • SRG-NET-000364-ALG-000122

    Group
  • SRG-NET-000383-ALG-000135

    Group
  • The A10 Networks ADC, when used to load balance web applications, must enable external logging for WAF data event messages.

    Without coordinated reporting between separate devices, it is not possible to identify the true scale and possible target of an attack. External logging must be enabled for WAF data event messages...
    Rule Low Severity
  • SRG-NET-000392-ALG-000141

    Group
  • The A10 Networks ADC must enable logging for packet anomaly events.

    Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay may result in the loss or compromise of information. Since these incide...
    Rule Medium Severity
  • SRG-NET-000392-ALG-000142

    Group
  • The A10 Networks ADC must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.

    Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay may result in the loss or compromise of information. The device genera...
    Rule Medium Severity
  • SRG-NET-000392-ALG-000148

    Group
  • SRG-NET-000401-ALG-000127

    Group
  • The A10 Networks ADC, when used for load-balancing web servers, must not allow the HTTP TRACE and OPTIONS methods.

    HTTP offers a number of methods that can be used to perform actions on the web server. Some of these HTTP methods can be used for nefarious purposes if the web server is misconfigured. The two HTTP...
    Rule Medium Severity
  • SRG-NET-000402-ALG-000130

    Group
  • SRG-NET-000511-ALG-000051

    Group
  • The A10 Networks ADC must, at a minimum, off-load audit log records onto a centralized log server.

    Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also protects the audit record in case the system/component being audited is comp...
    Rule Low Severity
  • SRG-NET-000512-ALG-000062

    Group
  • SRG-NET-000512-ALG-000062

    Group
  • SRG-NET-000362-ALG-000112

    Group
  • The A10 Networks ADC must protect against ICMP-based Denial of Service (DoS) attacks by employing ICMP Rate Limiting.

    If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation of content filtering gateways and application layer firewalls at key bou...
    Rule High Severity
  • SRG-NET-000512-ALG-000062

    Group
  • SRG-NET-000512-ALG-000062

    Group
  • The A10 Networks ADC must be a FIPS-compliant version.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network element must implement cryptographic modules adhering to the higher standa...
    Rule High Severity
  • SRG-NET-000062-ALG-000150

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules