Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000169-ALG-000102

    Group
  • The CA API Gateway providing user authentication intermediary services must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity for intruders to compromise resources within the network infrastructure. ...
    Rule Medium Severity
  • SRG-NET-000192-ALG-000121

    Group
  • The CA API Gateway providing content filtering must block outbound traffic containing known and unknown Denial of Service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.

    DoS attacks can take multiple forms but have the common objective of overloading or blocking a network or host to deny or seriously degrade performance. If the network does not provide safeguards a...
    Rule Medium Severity
  • SRG-NET-000213-ALG-000107

    Group
  • The CA API Gateway must terminate all network connections associated with a Policy Manager session at the end of the session or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity within the Policy Manager, and for user sessions simply viewing the contents of Policy Manager or viewing Audit Logs for tracking purposes (non-privileged session), the session must be terminated after 15 minutes of inactivity.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity
  • SRG-NET-000228-ALG-000108

    Group
  • The CA API Gateway must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.

    Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution ...
    Rule Medium Severity
  • SRG-NET-000230-ALG-000113

    Group
  • The CA API Gateway must protect the authenticity of communications sessions.

    Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false information into sessions. This requirement focuses on communications pro...
    Rule Medium Severity
  • SRG-NET-000231-ALG-000114

    Group
  • The CA API Gateway must invalidate session identifiers upon user logout or other session termination.

    Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries from capturing and continuing to employ previously valid session IDs. Session IDs are tokens...
    Rule Medium Severity
  • SRG-NET-000234-ALG-000116

    Group
  • The CA API Gateway must generate unique session identifiers using a FIPS 140-2 approved random number generator.

    Sequentially generated session IDs can be easily guessed by an attacker. Employing the concept of randomness in the generation of unique session identifiers helps to protect against brute-force att...
    Rule Medium Severity
  • SRG-NET-000246-ALG-000132

    Group
  • The CA API Gateway providing content filtering must integrate with an ICAP-enabled Intrusion Detection System that updates malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.

    Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. In order to minimize any potential negative impact to the organization caused by mali...
    Rule Medium Severity
  • SRG-NET-000248-ALG-000133

    Group
  • The CA API Gateway providing content filtering must be configured to perform real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed.

    Malicious code includes viruses, worms, trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. Malici...
    Rule Medium Severity
  • SRG-NET-000249-ALG-000134

    Group
  • The CA API Gateway providing content filtering must block malicious code upon detection.

    Taking an appropriate action based on local organizational incident handling procedures minimizes the impact of malicious code on the network. The CA API Gateway must be configured to integrate wi...
    Rule Medium Severity
  • SRG-NET-000249-ALG-000145

    Group
  • The CA API Gateway providing content filtering must delete or quarantine malicious code in response to malicious code detection.

    Taking an appropriate action based on local organizational incident handling procedures minimizes the impact of malicious code on the network. The ALG must be configured to block all detected mali...
    Rule Medium Severity
  • SRG-NET-000249-ALG-000146

    Group
  • The CA API Gateway providing content filtering must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection.

    Without an alert, security personnel may be unaware of an impending failure of the audit capability, which will impede the ability to perform forensic analysis and detect rate-based and other anoma...
    Rule Medium Severity
  • SRG-NET-000251-ALG-000131

    Group
  • The CA API Gateway providing content filtering must automatically update malicious code protection mechanisms.

    The malicious software detection functionality on network elements needs to be constantly updated in order to identify new threats as they are discovered. All malicious software detection function...
    Rule Medium Severity
  • SRG-NET-000273-ALG-000129

    Group
  • The CA API Gateway must generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries.

    Providing too much information in error messages risks compromising the data and security of the application and system. Organizations must carefully consider the structure/content of error messag...
    Rule Medium Severity
  • SRG-NET-000288-ALG-000109

    Group
  • The CA API Gateway providing content filtering must block or restrict detected prohibited mobile code.

    Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution ...
    Rule Medium Severity
  • SRG-NET-000289-ALG-000110

    Group
  • The CA API Gateway providing content filtering must prevent the download of prohibited mobile code.

    Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution ...
    Rule Medium Severity
  • SRG-NET-000313-ALG-000010

    Group
  • The CA API Gateway providing intermediary services for remote access communications traffic must control remote access methods.

    Remote access devices, such as those providing remote access to network devices and information systems, that lack automated control capabilities increase risk and makes remote user access manageme...
    Rule Medium Severity
  • SRG-NET-000318-ALG-000014

    Group
  • To protect against data mining, the CA API Gateway providing content filtering must prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

    Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unaut...
    Rule Medium Severity
  • SRG-NET-000318-ALG-000151

    Group
  • To protect against data mining, the CA API Gateway providing content filtering must prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.

    Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unaut...
    Rule Medium Severity
  • SRG-NET-000318-ALG-000152

    Group
  • To protect against data mining, the CA API Gateway providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.

    Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unaut...
    Rule Medium Severity
  • SRG-NET-000319-ALG-000015

    Group
  • To protect against data mining, the CA API Gateway providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

    Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational databases may result in...
    Rule Medium Severity
  • SRG-NET-000319-ALG-000020

    Group
  • To protect against data mining, the CA API Gateway providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.

    Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational databases may result in...
    Rule Medium Severity
  • SRG-NET-000319-ALG-000153

    Group
  • To protect against data mining, the CA API Gateway providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.

    Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational applications may result...
    Rule Medium Severity
  • SRG-NET-000334-ALG-000050

    Group
  • The CA API Gateway must off-load audit records onto a centralized log server.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. Th...
    Rule Medium Severity
  • SRG-NET-000337-ALG-000096

    Group
  • The CA API Gateway providing user authentication intermediary services must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    Without reauthentication, users may access resources or perform tasks for which they do not have authorization. In addition to the reauthentication requirements associated with session locks, orga...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules