Virtual Private Network (VPN) Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000371
<GroupDescription></GroupDescription>Group -
The VPN Gateway and Client must be configured to protect the confidentiality and integrity of transmitted information.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised as unprotected communicat...Rule High Severity -
SRG-NET-000375
<GroupDescription></GroupDescription>Group -
The IPsec VPN Gateway must use Encapsulating Security Payload (ESP) in tunnel mode for establishing secured paths to transport traffic between the organization's sites or between a gateway and remote end-stations.
<VulnDiscussion>ESP provides confidentiality, data origin authentication, integrity, and anti-replay services within the IPsec suite of proto...Rule Medium Severity -
SRG-NET-000400
<GroupDescription></GroupDescription>Group -
For accounts using password authentication, the site-to-site VPN Gateway must use SHA-2 or later protocol to protect the integrity of the password authentication process.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule Medium Severity -
SRG-NET-000492
<GroupDescription></GroupDescription>Group -
The VPN Gateway must generate log records when successful and/or unsuccessful VPN connection attempts occur.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Medium Severity -
SRG-NET-000510
<GroupDescription></GroupDescription>Group -
The VPN Gateway must use a FIPS-validated cryptographic module to generate cryptographic hashes.
<VulnDiscussion>FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...Rule Medium Severity -
SRG-NET-000510
<GroupDescription></GroupDescription>Group -
The VPN Gateway must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.
<VulnDiscussion>FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...Rule Medium Severity -
SRG-NET-000510
<GroupDescription></GroupDescription>Group -
The IPsec VPN Gateway IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...Rule Medium Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The IPsec VPN Gateway must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).
<VulnDiscussion>Without IKE, the SPI is manually specified for each security association. IKE peers will negotiate the encryption algorithm a...Rule High Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The VPN Gateway must not accept certificates that have been revoked when using PKI for authentication.
<VulnDiscussion>Situations may arise in which the certificate issued by a Certificate Authority (CA) may need to be revoked before the lifeti...Rule High Severity -
SRG-NET-000518
<GroupDescription></GroupDescription>Group -
The VPN Client logout function must be configured to terminate the session on/with the VPN Gateway.
<VulnDiscussion>If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.