Skip to content

F5 BIG-IP TMOS ALG Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000362-ALG-000112

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance providing content filtering must employ rate-based attack prevention behavior analysis.

    &lt;VulnDiscussion&gt;If the network does not provide safeguards against denial-of-service (DoS) attacks, network resources will be unavailable to ...
    Rule Medium Severity
  • SRG-NET-000362-ALG-000155

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance providing content filtering must protect against or limit the effects of known and unknown types of denial-of-service (DoS) attacks by employing pattern recognition pre-processors.

    &lt;VulnDiscussion&gt;If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation...
    Rule Medium Severity
  • SRG-NET-000401-ALG-000127

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must check the validity of all data inputs except those specifically identified by the organization.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...
    Rule Medium Severity
  • SRG-NET-000251-ALG-000131

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance providing content filtering must automatically update malicious code protection mechanisms.

    &lt;VulnDiscussion&gt;The malicious software detection functionality on network elements needs to be constantly updated to identify new threats as ...
    Rule Medium Severity
  • SRG-NET-000384-ALG-000136

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance providing content filtering must detect use of network services that have not been authorized or approved by the information system security manager (ISSM) and information system security officer (ISSO), at a minimum.

    &lt;VulnDiscussion&gt;Unauthorized or unapproved network services lack organizational verification or validation, and therefore may be unreliable o...
    Rule Medium Severity
  • SRG-NET-000385-ALG-000137

    <GroupDescription></GroupDescription>
    Group
  • When the Access Profile Type is LTM+APM and it is not using any connectivity resources (such as Network Access, Portal Access, etc.) in the VPE, the F5 BIG-IP appliance must be configured to enable the HTTP Only flag.

    &lt;VulnDiscussion&gt;To guard against cookie hijacking, only the BIG-IP APM controller and client must be able to view the full session ID. Settin...
    Rule Low Severity
  • SRG-NET-000233-ALG-000115

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to enable the secure cookie flag.

    &lt;VulnDiscussion&gt;To guard against cookie hijacking, only the BIG-IP APM controller and client must be able to view the full session ID. Sessio...
    Rule Low Severity
  • SRG-NET-000233-ALG-000115

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to disable the persistent cookie flag.

    &lt;VulnDiscussion&gt;For BIG-IP APM deployments with connectivity resources (such as Network Access, Portal Access, etc.), BIG-IP APM cookies cann...
    Rule Low Severity
  • SRG-NET-000164-ALG-000100

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must configure certificate path validation to ensure revoked user credentials are prohibited from establishing an allowed session.

    &lt;VulnDiscussion&gt;A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...
    Rule High Severity
  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must not use the On-demand Cert Auth VPE agent as part of the APM Policy Profiles.

    &lt;VulnDiscussion&gt;By requiring mutual authentication before any communication, it becomes significantly challenging for attackers to impersonat...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules