Virtual Private Network (VPN) Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The VPN Gateway must uniquely identify all network-connected endpoint devices before establishing a connection.
<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. For...Rule Medium Severity -
SRG-NET-000164
<GroupDescription></GroupDescription>Group -
The site-to-site VPN, when using PKI-based authentication for devices, must enforce authorized access to the corresponding private key.
<VulnDiscussion>If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...Rule Medium Severity -
The Remote Access VPN Gateway must use a separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication.
<VulnDiscussion>The VPN interacts directly with public networks and devices and should not contain user authentication information for all us...Rule Medium Severity -
SRG-NET-000166
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules