Kona Site Defender providing content filtering must block malicious code upon detection.
An XCCDF Rule
Description
<VulnDiscussion>Taking an appropriate action based on local organizational incident handling procedures minimizes the impact of malicious code on the network. This requirement is limited to ALGs, web content filters, and packet inspection firewalls that perform malicious code detection as part of their functionality.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-91133r1_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
Configure the Kona Site Defender to block traffic for organizationally defined HTTP protocol violations, HTTP policy violations, SQL injection, remote file inclusion, cross-site scripting, command injection attacks, and any applicable custom rules.
The Akamai Professional Services team should be consulted to implement this Fix content due to the complexities involved. In most cases, this should be included in the SLA.
1. Log in to the Akamai Luna Portal (https://control.akamai.com).
2. Click the "Configure" tab.