II - Mission Support Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000355-ALG-000117
Group -
Kona Site Defender providing user authentication intermediary services using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of protected sessions.
Non-DoD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in place that are sufficient for DoD systems to rely on the identity asserte...Rule High Severity -
SRG-NET-000246-ALG-000132
Group -
Kona Site Defender providing content filtering must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.
Malicious code protection mechanisms include but are not limited to anti-virus and malware detection software. To minimize any potential negative impact to the organization caused by malicious code...Rule Medium Severity -
SRG-NET-000249-ALG-000134
Group -
Kona Site Defender providing content filtering must block malicious code upon detection.
Taking an appropriate action based on local organizational incident handling procedures minimizes the impact of malicious code on the network. This requirement is limited to ALGs, web content filt...Rule Medium Severity -
SRG-NET-000249-ALG-000146
Group -
Kona Site Defender providing content filtering must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection.
Without an alert, security personnel may be unaware of an impending failure of the audit capability. This will impede the ability to perform forensic analysis and detect rate-based and other anomal...Rule Medium Severity -
SRG-NET-000383-ALG-000135
Group -
Kona Site Defender providing content filtering must be configured to integrate with a system-wide intrusion detection system.
Without coordinated reporting between separate devices, it is not possible to identify the true scale and possible target of an attack. Integration of the ALG with a system-wide intrusion detectio...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.