Skip to content

CA API Gateway ALG Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must protect the authenticity of communications sessions.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule Medium Severity
  • SRG-NET-000231-ALG-000114

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must invalidate session identifiers upon user logout or other session termination.

    &lt;VulnDiscussion&gt;Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries from capturing and co...
    Rule Medium Severity
  • SRG-NET-000234-ALG-000116

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must generate unique session identifiers using a FIPS 140-2 approved random number generator.

    &lt;VulnDiscussion&gt;Sequentially generated session IDs can be easily guessed by an attacker. Employing the concept of randomness in the generatio...
    Rule Medium Severity
  • SRG-NET-000246-ALG-000132

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing content filtering must integrate with an ICAP-enabled Intrusion Detection System that updates malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.

    &lt;VulnDiscussion&gt;Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. In order to m...
    Rule Medium Severity
  • SRG-NET-000248-ALG-000133

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing content filtering must be configured to perform real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed.

    &lt;VulnDiscussion&gt;Malicious code includes viruses, worms, trojan horses, and spyware. The code provides the ability for a malicious user to rea...
    Rule Medium Severity
  • SRG-NET-000249-ALG-000134

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing content filtering must block malicious code upon detection.

    &lt;VulnDiscussion&gt;Taking an appropriate action based on local organizational incident handling procedures minimizes the impact of malicious cod...
    Rule Medium Severity
  • SRG-NET-000249-ALG-000145

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing content filtering must delete or quarantine malicious code in response to malicious code detection.

    &lt;VulnDiscussion&gt;Taking an appropriate action based on local organizational incident handling procedures minimizes the impact of malicious cod...
    Rule Medium Severity
  • SRG-NET-000249-ALG-000146

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing user authentication intermediary services must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. In addition ...
    Rule Medium Severity
  • The CA API Gateway providing content filtering must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection.

    &lt;VulnDiscussion&gt;Without an alert, security personnel may be unaware of an impending failure of the audit capability, which will impede the ab...
    Rule Medium Severity
  • SRG-NET-000251-ALG-000131

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing content filtering must automatically update malicious code protection mechanisms.

    &lt;VulnDiscussion&gt;The malicious software detection functionality on network elements needs to be constantly updated in order to identify new th...
    Rule Medium Severity
  • SRG-NET-000273-ALG-000129

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules