Skip to content

CA API Gateway ALG Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000392-ALG-000148

    Group
  • SRG-NET-000392-ALG-000149

    Group
  • The ALG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.

    Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this delay may result in the loss or compromise of information. The ALG generate...
    Rule Medium Severity
  • SRG-NET-000400-ALG-000097

    Group
  • SRG-NET-000401-ALG-000127

    Group
  • The CA API Gateway must check the validity of all data inputs except those specifically identified by the organization.

    Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application is unprepared to process that data. This results in unanticipated applic...
    Rule Medium Severity
  • SRG-NET-000402-ALG-000130

    Group
  • The CA API Gateway must reveal error messages only to the ISSO, ISSM, and SCA.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can give configuration details about the...
    Rule Medium Severity
  • SRG-NET-000503-ALG-000038

    Group
  • The CA API Gateway providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-NET-000505-ALG-000039

    Group
  • SRG-NET-000510-ALG-000025

    Group
  • The CA API Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.

    Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network element must implement cryptographic modules adhering to the higher standards ...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000040

    Group
  • SRG-NET-000512-ALG-000065

    Group
  • The CA API Gateway that provides intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.

    Application protocol anomaly detection examines application layer protocols such as FTP to identify attacks based on observed deviations in the normal RFC behavior of a protocol or service. This ty...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000066

    Group
  • SRG-NET-000517-ALG-000006

    Group
  • The CA API Gateway providing user access control intermediary services must automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur.

    Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i....
    Rule Medium Severity
  • SRG-NET-000518-ALG-000007

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules