Skip to content

Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000319-ALG-000153

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, Kona Site Defender providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000334-ALG-000050

    <GroupDescription></GroupDescription>
    Group
  • Kona Site Defender must off-load audit records onto a centralized log server.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-NET-000511-ALG-000051

    <GroupDescription></GroupDescription>
    Group
  • Kona Site Defender must off-load audit records onto a centralized log server in real time.

    &lt;VulnDiscussion&gt;Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also prot...
    Rule Low Severity
  • SRG-NET-000169-ALG-000102

    <GroupDescription></GroupDescription>
    Group
  • Kona Site Defender must not strip origin-defined HTTP session headers.

    &lt;VulnDiscussion&gt;Lack of authentication enables anyone to gain access to the network or possibly a network element that provides the opportuni...
    Rule Medium Severity
  • SRG-NET-000362-ALG-000112

    <GroupDescription></GroupDescription>
    Group
  • Kona Site Defender providing content filtering must protect against known and unknown types of denial-of-service (DoS) attacks by employing rate-based attack prevention behavior analysis.

    &lt;VulnDiscussion&gt;If the network does not provide safeguards against DoS attacks, network resources may not be available to users during an att...
    Rule Medium Severity
  • SRG-NET-000362-ALG-000126

    <GroupDescription></GroupDescription>
    Group
  • Kona Site Defender providing content filtering must protect against known types of denial-of-service (DoS) attacks by employing signatures.

    &lt;VulnDiscussion&gt;If the network does not provide safeguards against DoS attacks, network resources may not be available to users during an att...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000066

    <GroupDescription></GroupDescription>
    Group
  • Kona Site Defender that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.

    &lt;VulnDiscussion&gt;Application protocol anomaly detection examines application layer protocols such as HTTP to identify attacks based on observe...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000025

    <GroupDescription></GroupDescription>
    Group
  • Kona Site Defender providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...
    Rule High Severity
  • SRG-NET-000510-ALG-000040

    <GroupDescription></GroupDescription>
    Group
  • Kona Site Defender providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000111

    <GroupDescription></GroupDescription>
    Group
  • Kona Site Defender providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules