CA API Gateway ALG Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000169-ALG-000102
Group -
The CA API Gateway providing user authentication intermediary services must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity for intruders to compromise resources within the network infrastructure. ...Rule Medium Severity -
SRG-NET-000192-ALG-000121
Group -
SRG-NET-000213-ALG-000107
Group -
The CA API Gateway must terminate all network connections associated with a Policy Manager session at the end of the session or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity within the Policy Manager, and for user sessions simply viewing the contents of Policy Manager or viewing Audit Logs for tracking purposes (non-privileged session), the session must be terminated after 15 minutes of inactivity.
Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...Rule Medium Severity -
SRG-NET-000228-ALG-000108
Group -
SRG-NET-000230-ALG-000113
Group -
SRG-NET-000231-ALG-000114
Group -
The CA API Gateway must invalidate session identifiers upon user logout or other session termination.
Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries from capturing and continuing to employ previously valid session IDs. Session IDs are tokens...Rule Medium Severity -
SRG-NET-000234-ALG-000116
Group -
The CA API Gateway must generate unique session identifiers using a FIPS 140-2 approved random number generator.
Sequentially generated session IDs can be easily guessed by an attacker. Employing the concept of randomness in the generation of unique session identifiers helps to protect against brute-force att...Rule Medium Severity -
SRG-NET-000246-ALG-000132
Group -
SRG-NET-000248-ALG-000133
Group -
SRG-NET-000249-ALG-000134
Group -
The CA API Gateway providing content filtering must block malicious code upon detection.
Taking an appropriate action based on local organizational incident handling procedures minimizes the impact of malicious code on the network. The CA API Gateway must be configured to integrate wi...Rule Medium Severity -
SRG-NET-000249-ALG-000145
Group -
The CA API Gateway providing content filtering must delete or quarantine malicious code in response to malicious code detection.
Taking an appropriate action based on local organizational incident handling procedures minimizes the impact of malicious code on the network. The ALG must be configured to block all detected mali...Rule Medium Severity -
SRG-NET-000249-ALG-000146
Group -
The CA API Gateway providing user authentication intermediary services must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. In addition to the reauthentication requirements associated with session locks, orga...Rule Medium Severity -
SRG-NET-000251-ALG-000131
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.