Skip to content

Application Layer Gateway Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000314

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing intermediary services for remote access communications traffic must provide the capability to immediately disconnect or disable remote access to the information system.

    &lt;VulnDiscussion&gt;Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking progress would n...
    Rule Medium Severity
  • SRG-NET-000318

    <GroupDescription></GroupDescription>
    Group
  • The ALG that is part of a CDS must uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.

    &lt;VulnDiscussion&gt;Attribution is a critical component of a security concept of operations. The ability to identify source and destination point...
    Rule Medium Severity
  • SRG-NET-000326

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering must prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000318

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering must prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000318

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000319

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000319

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000349

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000319

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000323

    <GroupDescription></GroupDescription>
    Group
  • The ALG that is part of a CDS must use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.

    &lt;VulnDiscussion&gt;If information flow is not enforced based on approved authorizations, the system may become compromised. A mechanism to dete...
    Rule Medium Severity
  • SRG-NET-000324

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules