Skip to content

Virtual Private Network (VPN) Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000099

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway log must protect audit information from unauthorized modification when stored locally.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...
    Rule Medium Severity
  • SRG-NET-000100

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must protect audit information from unauthorized deletion when stored locally.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...
    Rule Medium Severity
  • SRG-NET-000132

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-NET-000132

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway must use IKEv2 for IPsec VPN security associations.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-NET-000132

    <GroupDescription></GroupDescription>
    Group
  • The Remote Access VPN Gateway must be configured to prohibit Point-to-Point Tunneling Protocol (PPTP) and L2F.

    &lt;VulnDiscussion&gt;The PPTP and L2F are obsolete method for implementing virtual private networks. Both protocols may be easy to use and readily...
    Rule Medium Severity
  • SRG-NET-000132

    <GroupDescription></GroupDescription>
    Group
  • For site-to-site VPN implementations, the L2TP protocol must be blocked or denied at the security boundary with the private network so unencrypted L2TP packets cannot traverse into the private network of the enclave.

    &lt;VulnDiscussion&gt;Unlike GRE (a simple encapsulating header) L2TP is a full-fledged communications protocol with control channel, data channels...
    Rule Medium Severity
  • SRG-NET-000138

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-NET-000140

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to ...
    Rule High Severity
  • SRG-NET-000145

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    &lt;VulnDiscussion&gt;Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...
    Rule Medium Severity
  • SRG-NET-000165

    <GroupDescription></GroupDescription>
    Group
  • The VPN Client must implement multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules