Skip to content

Juniper SRX SG NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000374-NDM-000299

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway must record time stamps for log records using Coordinated Universal Time (UTC).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Medium Severity
  • SRG-APP-000378-NDM-000302

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway must implement logon roles to ensure only authorized roles are allowed to install software and updates.

    &lt;VulnDiscussion&gt;Allowing anyone to install software, without explicit privileges, creates the risk that untested or potentially malicious sof...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway must have the number of rollbacks set to 5 or more.

    &lt;VulnDiscussion&gt;Backup of the configuration files allows recovery in case of corruption, misconfiguration, or catastrophic failure. The maxim...
    Rule Low Severity
  • SRG-APP-000373-NDM-000298

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway must be configured to synchronize internal information system clocks with the primary and secondary NTP servers for the network.

    &lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000336

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway must be configured to use an authentication server to centrally manage authentication and logon settings for remote and nonlocal access.

    &lt;VulnDiscussion&gt;Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway must use DOD-approved PKI rather than proprietary or self-signed device certificates.

    &lt;VulnDiscussion&gt;To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-ap...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway must be configured to prohibit the use of unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway must ensure access to start a UNIX-level shell is restricted to only the root account.

    &lt;VulnDiscussion&gt;Restricting the privilege to create a UNIX-level shell limits access to this powerful function. System administrators, regard...
    Rule Medium Severity
  • For nonlocal maintenance sessions, the Juniper SRX Services Gateway must remove or explicitly deny the use of nonsecure protocols.

    &lt;VulnDiscussion&gt;If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susce...
    Rule Medium Severity
  • SRG-APP-000395-NDM-000310

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway must authenticate NTP servers before establishing a network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity
  • SRG-APP-000142-NDM-000245

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules