Skip to content

F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The BIG-IP Core implementation must be configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to virtual servers.

    <VulnDiscussion>Display of a standardized and approved use notification before granting access to the virtual servers ensures privacy and sec...
    Rule Low Severity
  • SRG-NET-000042-ALG-000023

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to publicly accessible applications.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the publicly accessible network element ens...
    Rule Low Severity
  • SRG-NET-000053-ALG-000001

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to limit the number of concurrent sessions to an organization-defined number for virtual servers.

    &lt;VulnDiscussion&gt;Network element management includes the ability to control the number of users and user sessions that utilize a network eleme...
    Rule High Severity
  • SRG-NET-000061-ALG-000009

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to monitor inbound traffic for remote access policy compliance when accepting connections to virtual servers.

    &lt;VulnDiscussion&gt;Automated monitoring of remote access traffic allows organizations to detect cyber attacks and also ensure ongoing compliance...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000011

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to use encryption services that implement NIST SP 800-52 Revision 2 compliant cryptography to protect the confidentiality of connections to virtual servers.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000150

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to comply with the required TLS settings in NIST SP 800-52 Revision 1 for TLS services to virtual servers.

    &lt;VulnDiscussion&gt;NIST SP 800-52 Revision 1 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using...
    Rule Medium Severity
  • SRG-NET-000063-ALG-000012

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to use NIST SP 800-52 Revision 1 compliant cryptography to protect the integrity of remote access sessions to virtual servers.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-NET-000098-ALG-000056

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit information from unauthorized read access.

    &lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means...
    Rule Medium Severity
  • SRG-NET-000099-ALG-000057

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit information from unauthorized modification.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...
    Rule Medium Severity
  • SRG-NET-000100-ALG-000058

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit information from unauthorized deletion.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...
    Rule Medium Severity
  • SRG-NET-000101-ALG-000059

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules