Cloud Computing Mission Owner Network Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000205
<GroupDescription></GroupDescription>Group -
The Mission Owner's internet-facing applications must be configured to traverse the Cloud Access Point (CAP) and Virtual Datacenter Security Stack (VDSS) prior to communicating with the internet.
<VulnDiscussion>The CAP and VDSS architectures mitigate potential damages to the Defense Information Systems Network (DISN) and provide the a...Rule High Severity -
SRG-NET-000205
<GroupDescription></GroupDescription>Group -
The Mission Owner of the Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must configure scanning using an Assured Compliance Assessment Solution (ACAS) server or solution that meets DOD scanning and reporting requirements.
<VulnDiscussion>Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the operating syste...Rule Medium Severity -
SRG-NET-000205
<GroupDescription></GroupDescription>Group -
The Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must be configured to maintain separation of all management and data traffic.
<VulnDiscussion>The Virtual Datacenter Management system provides a management plane for privileged access and communications. Separation of ...Rule Medium Severity -
SRG-NET-000383
<GroupDescription></GroupDescription>Group -
For Infrastructure as a Service (IaaS)/Platform as a Service (PaaS), the Mission Owner must configure an intrusion detection and prevention system (IDPS) to protect DOD virtual machines (VMs), services, and applications.
<VulnDiscussion>Network environments and applications installed using an IaaS/PaaS cloud service offering where the Mission Owner has control...Rule High Severity -
SRG-NET-000390
<GroupDescription></GroupDescription>Group -
The Mission Owner of the Infrastructure as a Service (IaaS) or Platform as a Service (PaaS) must continuously monitor and protect inbound communications from external systems, other IaaS within the same cloud service environment, or collocated mission applications for unusual or unauthorized activities or conditions.
<VulnDiscussion>Evidence of malicious code is used to identify potentially compromised information systems or information system components. ...Rule Medium Severity -
SRG-NET-000391
<GroupDescription></GroupDescription>Group -
The Mission Owner of the Infrastructure as a Service (IaaS) must continuously monitor outbound communications to other systems and enclaves for unusual or unauthorized activities or conditions.
<VulnDiscussion>Evidence of malicious code is used to identify potentially compromised information systems or information system components. ...Rule Medium Severity -
SRG-NET-000580
<GroupDescription></GroupDescription>Group -
The Mission Owner of the Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must implement an encrypted, FIPS 140-2/3 compliant path between the implemented systems/applications and the DOD Online Certificate Status Protocol (OCSP) responders.
<VulnDiscussion>The Mission Owner must use identity services, including an OCSP responder, for remote system DOD Common Access Card (CAC) two...Rule Medium Severity -
SRG-NET-000580
<GroupDescription></GroupDescription>Group -
The Mission Owner of the Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must use valid DOD Online Certificate Status Protocol (OCSP) responders.
<VulnDiscussion>To provide assurances that certificates are validated by the correct responders, the Mission Owner must ensure they are using...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.