Skip to content

F5 BIG-IP Access Policy Manager Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The BIG-IP APM module must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to publicly accessible applications.

    <VulnDiscussion>Display of a standardized and approved use notification before granting access to the publicly accessible network element ens...
    Rule Low Severity
  • SRG-NET-000138-ALG-000063

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP APM module must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) when connecting to virtual servers.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-NET-000138-ALG-000088

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP APM module access policy profile must control remote access methods to virtual servers.

    &lt;VulnDiscussion&gt;Remote access devices, such as those providing remote access to network devices and information systems, which lack automated...
    Rule Medium Severity
  • SRG-NET-000337-ALG-000096

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP APM module must require users to reauthenticate when the user's role or information authorizations are changed.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which authorization has been removed. In addition ...
    Rule Medium Severity
  • SRG-NET-000339-ALG-000090

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP APM module must be configured to require multifactor authentication for remote access with non-privileged accounts to virtual servers in such a way that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;For remote access to non-privileged accounts, the purpose of requiring a device that is separate from the information system ...
    Rule Medium Severity
  • SRG-NET-000340-ALG-000091

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP APM module must be configured to require multifactor authentication for remote access with privileged accounts to virtual servers in such a way that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;For remote access to privileged accounts, the purpose of requiring a device that is separate from the information system gain...
    Rule Medium Severity
  • SRG-NET-000349-ALG-000106

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance APM Access Policies that grant access to web application resources must allow only client certificates that have the User Persona Name (UPN) value in the User Persona Client Certificates.

    &lt;VulnDiscussion&gt;To enhance the security, it is advisable to append additional checks and APM Deny/Fallback branches to APM Access Profiles in...
    Rule Low Severity
  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to limit authenticated client sessions to initial session source IP.

    &lt;VulnDiscussion&gt;The "Restrict to Single Client IP" is a safeguard against session hijacking or cookie theft. Even if an attacker manages to s...
    Rule Low Severity
  • SRG-NET-000053-ALG-000001

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to set the "Max In Progress Sessions per Client IP" value to 10 or less.

    &lt;VulnDiscussion&gt;The "Max In Progress Sessions Per Client IP" setting in an APM Access Pro?le is a security con?guration that limits the numbe...
    Rule Low Severity
  • SRG-NET-000015-ALG-000016

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must enforce approved authorizations for logical access to resources by explicitly configuring assigned resources with an authorization list.

    &lt;VulnDiscussion&gt;Authentication alone must not be sufficient to assign APM resources to a connecting client. Access to APM resources (e.g., Po...
    Rule Medium Severity
  • SRG-NET-000233-ALG-000115

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules