The ICS must be configured to ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.
An XCCDF Rule
Description
Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth and other resources. VPN traffic received from another enclave with different security policy or level of trust must not bypass be inspected by the firewall before being forwarded to the private network.
- ID
- SV-258583r930437_rule
- Version
- IVCS-VN-000010
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Establish Access Control policy in accordance with the site's system security plan. Policies will vary based on security policies and architecture.
In the ICS Web UI, navigate to Users >> Resource Policies >> VPN Tunneling >> Access Control.
1. Click "New Policy".
2. Enter a name.
3. Under IPv4 Resources, add all allowed ports and protocols required for users. Examples provided below: