CA API Gateway ALG Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000018-ALG-000017
Group -
SRG-NET-000101-ALG-000059
Group -
SRG-NET-000337-ALG-000096
Group -
SRG-NET-000019-ALG-000018
Group -
The CA API Gateway must restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.
Information flow control regulates where information is allowed to travel within a network and between interconnected networks. Blocking or restricting detected harmful or suspicious communications...Rule Medium Severity -
SRG-NET-000041-ALG-000022
Group -
The CA API Gateway providing user access control intermediary services must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.
Display of a standardized and approved use notification before granting access to the network ensures privacy and security notification verbiage used is consistent with applicable federal laws, Exe...Rule Medium Severity -
SRG-NET-000042-ALG-000023
Group -
SRG-NET-000043-ALG-000024
Group -
The CA API Gateway providing user access control intermediary services for publicly accessible applications must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.
Display of a standardized and approved use notification before granting access to the publicly accessible network element ensures privacy and security notification verbiage used is consistent with ...Rule Medium Severity -
SRG-NET-000053-ALG-000001
Group -
The CA API Gateway providing user access control intermediary services must limit users to two concurrent sessions.
Network element management includes the ability to control the number of users and user sessions that utilize a network element. Limiting the number of current sessions per user is helpful in limit...Rule Medium Severity -
SRG-NET-000062-ALG-000011
Group -
SRG-NET-000062-ALG-000092
Group -
The CA API Gateway that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.
Private key data is used to prove the entity presenting a public key certificate is the certificate's rightful owner. Compromise of private key data allows an adversary to impersonate the key holde...Rule Medium Severity -
SRG-NET-000062-ALG-000150
Group -
The CA API Gateway that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.
SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthorized versions or incorrectly configuring protocol negotiation makes the G...Rule Medium Severity -
SRG-NET-000063-ALG-000012
Group -
The CA API Gateway providing intermediary services for remote access communications traffic must use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access is access to DoD-nonpublic information systems by an authorized user ...Rule Medium Severity -
SRG-NET-000077-ALG-000046
Group -
SRG-NET-000078-ALG-000047
Group -
SRG-NET-000079-ALG-000048
Group -
The CA API Gateway must generate audit records containing information to establish the identity of any individual or process associated with the event.
Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility...Rule Medium Severity -
SRG-NET-000098-ALG-000056
Group -
SRG-NET-000100-ALG-000058
Group -
The CA API Gateway must protect audit information from unauthorized deletion.
If audit data becomes compromised, forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit data, the i...Rule Medium Severity -
SRG-NET-000131-ALG-000085
Group -
SRG-NET-000131-ALG-000086
Group -
The CA API Gateway must be configured to remove or disable unrelated or unneeded application proxy services.
Unrelated or unneeded proxy services increase the attack vector and add excessive complexity to the securing of the ALG. Multiple application proxies can be installed on many ALGs. However, proxy t...Rule Medium Severity -
SRG-NET-000132-ALG-000087
Group -
The CA API Gateway must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable...Rule Medium Severity -
SRG-NET-000138-ALG-000063
Group -
The CA API Gateway providing user authentication intermediary services must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...Rule Medium Severity -
SRG-NET-000138-ALG-000088
Group -
SRG-NET-000138-ALG-000089
Group -
The CA API Gateway providing user authentication intermediary services must restrict user authentication traffic to specific authentication server(s).
User authentication can be used as part of the policy filtering rule sets. Some URLs or network resources can be restricted to authenticated users only. Users are prompted by the application or bro...Rule Medium Severity -
SRG-NET-000140-ALG-000094
Group -
SRG-NET-000147-ALG-000095
Group -
The CA API Gateway providing user authentication intermediary services must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...Rule Medium Severity -
SRG-NET-000166-ALG-000101
Group -
SRG-NET-000169-ALG-000102
Group -
The CA API Gateway providing user authentication intermediary services must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity for intruders to compromise resources within the network infrastructure. ...Rule Medium Severity -
SRG-NET-000192-ALG-000121
Group -
SRG-NET-000213-ALG-000107
Group -
The CA API Gateway must terminate all network connections associated with a Policy Manager session at the end of the session or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity within the Policy Manager, and for user sessions simply viewing the contents of Policy Manager or viewing Audit Logs for tracking purposes (non-privileged session), the session must be terminated after 15 minutes of inactivity.
Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...Rule Medium Severity -
SRG-NET-000228-ALG-000108
Group -
SRG-NET-000230-ALG-000113
Group -
SRG-NET-000231-ALG-000114
Group -
The CA API Gateway must invalidate session identifiers upon user logout or other session termination.
Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries from capturing and continuing to employ previously valid session IDs. Session IDs are tokens...Rule Medium Severity -
SRG-NET-000234-ALG-000116
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.