Skip to content

Virtual Private Network (VPN) Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000330

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must notify the user, upon successful logon (access), of the organization-defined information to be included in addition to the date and time of the last logon (access).

    &lt;VulnDiscussion&gt;Users need to be aware of activity that occurs regarding their account. Providing users with information deemed important by ...
    Rule Low Severity
  • SRG-NET-000333

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must provide centralized management and configuration of the content to be captured in log records generated by all network components.

    &lt;VulnDiscussion&gt;Without the ability to centrally manage the content captured in the log records, identification, troubleshooting, and correla...
    Rule Medium Severity
  • SRG-NET-000334

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must generate a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-NET-000336

    <GroupDescription></GroupDescription>
    Group
  • When communications with the Central Log Server is lost, the VPN Gateway must continue to queue traffic log records locally.

    &lt;VulnDiscussion&gt;If the system were to continue processing after audit failure, actions can be taken on the system that cannot be tracked and ...
    Rule Medium Severity
  • SRG-NET-000337

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway must renegotiate the security association after 8 hours or less, or an organization-defined period.

    &lt;VulnDiscussion&gt;The IPsec SA and its corresponding key will expire either after the number of seconds or amount of traffic volume has exceede...
    Rule Medium Severity
  • SRG-NET-000337

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must renegotiate the security association after 24 hours or less or as defined by the organization.

    &lt;VulnDiscussion&gt;When a VPN gateway creates an IPsec Security Association (SA), resources must be allocated to maintain the SA. These resource...
    Rule Medium Severity
  • SRG-NET-000341

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must authenticate all network-connected endpoint devices before establishing a connection.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-NET-000352

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The National Secu...
    Rule Medium Severity
  • SRG-NET-000369

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must disable split-tunneling for remote clients VPNs.

    &lt;VulnDiscussion&gt;Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to e...
    Rule Medium Severity
  • SRG-NET-000371

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway must specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation.

    &lt;VulnDiscussion&gt;PFS generates each new encryption key independently from the previous key. Without PFS, compromise of one key will compromise...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules