Skip to content

Cisco ASA VPN Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000077-VPN-000280

    Group
  • The Cisco ASA must be configured to generate log records containing information to establish what type of VPN events occurred.

    Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. VPN gateways often have a separate au...
    Rule Low Severity
  • The Cisco ASA must be configured to generate log records containing information to establish when the events occurred.

    Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. VPN gateways often have a separate audit log for ...
    Rule Low Severity
  • The Cisco ASA must be configured to queue log records locally in the event that the central audit server is down or not reachable.

    If the system were to continue processing after audit failure, actions can be taken on the system that cannot be tracked and recorded for later forensic analysis. Because of the importance of ensu...
    Rule Medium Severity
  • The Cisco ASA must be configured to validate certificates via a trustpoint that identifies a DoD or DoD-approved certificate authority.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. To meet this requirement, the information...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules