F5 BIG-IP Access Policy Manager Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
When the Access Profile Type is LTM+APM and it is not using any connectivity resources (such as Network Access, Portal Access, etc.) in the VPE, the F5 BIG-IP appliance must be configured to enable the HTTP Only flag.
<VulnDiscussion>To guard against cookie hijacking, only the BIG-IP APM controller and client must be able to view the full session ID. Settin...Rule Low Severity -
SRG-NET-000233-ALG-000115
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must be configured to enable the "Secure" cookie flag.
<VulnDiscussion>To guard against cookie hijacking, only the BIG-IP APM controller and client must be able to view the full session ID. Sessio...Rule Low Severity -
SRG-NET-000233-ALG-000115
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must be configured to disable the "Persistent" cookie flag.
<VulnDiscussion>For BIG-IP APM deployments with connectivity resources (such as Network Access, Portal Access, etc.), BIG-IP APM cookies cann...Rule Low Severity -
The BIG-IP APM module must restrict user authentication traffic to specific authentication server(s) when providing user authentication to virtual servers.
<VulnDiscussion>User authentication can be used as part of the policy filtering rule sets. Some URLs or network resources can be restricted t...Rule Medium Severity -
SRG-NET-000140-ALG-000094
<GroupDescription></GroupDescription>Group -
The BIG-IP APM module must use multifactor authentication for network access to non-privileged accounts.
<VulnDiscussion>To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to ...Rule Medium Severity -
SRG-NET-000166-ALG-000101
<GroupDescription></GroupDescription>Group -
The BIG-IP APM module must map the authenticated identity to the user account for PKI-based authentication to virtual servers.
<VulnDiscussion>Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure on...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.