Palo Alto Networks ALG Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Palo Alto Networks security platform must automatically update malicious code protection mechanisms.
<VulnDiscussion>Remote access is access to DOD nonpublic information systems by an authorized user (or an information system) communicating t...Rule Medium Severity -
SRG-NET-000288-ALG-000109
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must deny or restrict detected prohibited mobile code.
<VulnDiscussion>Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded an...Rule Medium Severity -
SRG-NET-000289-ALG-000110
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must prevent the download of prohibited mobile code.
<VulnDiscussion>MMobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded a...Rule Medium Severity -
SRG-NET-000313-ALG-000010
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must control remote access methods (inspect and filter traffic).
<VulnDiscussion>Remote access devices, such as those providing remote access to network devices and information systems, which lack automated...Rule Medium Severity -
SRG-NET-000314-ALG-000013
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security, if used as a TLS gateway/decryption point or VPN concentrator, must provide the capability to immediately disconnect or disable remote access to the information system.
<VulnDiscussion>Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking place would not ...Rule Medium Severity -
SRG-NET-000318-ALG-000014
<GroupDescription></GroupDescription>Group -
To protect against data mining, the Palo Alto Networks security platform must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000318-ALG-000151
<GroupDescription></GroupDescription>Group -
To protect against data mining, the Palo Alto Networks security platform must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000334-ALG-000050
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must off-load audit records onto a different system or media than the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-NET-000355-ALG-000117
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform being used for TLS/SSL decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions.
<VulnDiscussion>Non-DoD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in p...Rule Medium Severity -
SRG-NET-000362-ALG-000112
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must block outbound traffic containing denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources may be unavailable to users. Installation o...Rule High Severity -
SRG-NET-000362-ALG-000126
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.