Skip to content

CA API Gateway ALG Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000505-ALG-000039

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000025

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000040

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000065

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway that provides intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.

    &lt;VulnDiscussion&gt;Application protocol anomaly detection examines application layer protocols such as FTP to identify attacks based on observed...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000066

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.

    &lt;VulnDiscussion&gt;Application protocol anomaly detection examines application layer protocols such as HTTP to identify attacks based on observe...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules