Virtual Private Network (VPN) Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000510
<GroupDescription></GroupDescription>Group -
The IPsec VPN Gateway IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...Rule Medium Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The IPsec VPN Gateway must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).
<VulnDiscussion>Without IKE, the SPI is manually specified for each security association. IKE peers will negotiate the encryption algorithm a...Rule High Severity -
SRG-NET-000518
<GroupDescription></GroupDescription>Group -
The VPN Client logout function must be configured to terminate the session on/with the VPN Gateway.
<VulnDiscussion>If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...Rule Medium Severity -
SRG-NET-000519
<GroupDescription></GroupDescription>Group -
The VPN Client must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
<VulnDiscussion>If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...Rule Medium Severity -
SRG-NET-000522
<GroupDescription></GroupDescription>Group -
For site-to-site, VPN Gateway must be configured to store only cryptographic representations of pre-shared Keys (PSKs).
<VulnDiscussion>PSKs need to be protected at all times, and encryption is the standard method for protecting passwords. If PSKs are not encry...Rule Medium Severity -
SRG-NET-000525
<GroupDescription></GroupDescription>Group -
The IPsec VPN must use AES256 or greater encryption for the IPsec proposal to protect the confidentiality of remote access sessions.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-NET-000530
<GroupDescription></GroupDescription>Group -
The TLS VPN Gateway that supports Government-only services must prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.
<VulnDiscussion>Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...Rule Medium Severity -
SRG-NET-000540
<GroupDescription></GroupDescription>Group -
The TLS VPN Gateway that supports citizen- or business-facing network devices must prohibit client negotiation to SSL 2.0 or SSL 3.0.
<VulnDiscussion>Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...Rule Medium Severity -
SRG-NET-000550
<GroupDescription></GroupDescription>Group -
The VPN Gateway that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) must configure SNMPv3 to use FIPS-validated AES cipher block algorithm.
<VulnDiscussion>Without device-to-device authentication, communications with malicious devices may be established. Bidirectional authenticati...Rule Medium Severity -
SRG-NET-000565
<GroupDescription></GroupDescription>Group -
The VPN remote access server must be configured use cryptographic algorithms approved by NSA to protect NSS for remote access to a classified network.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.