Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000132-VPN-000460

    Group
  • The Cisco ASA must be configured to use Internet Key Exchange v2 (IKEv2) for all IPsec security associations.

    In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable...
    Rule Medium Severity
  • SRG-NET-000510-VPN-002180

    Group
  • The Cisco ASA must be configured to use NIST FIPS-validated cryptography for Internet Key Exchange (IKE) Phase 1.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gateway must implement cryptographic modules adhering to the higher standards ...
    Rule Medium Severity
  • SRG-NET-000371-VPN-001640

    Group
  • The Cisco ASA must be configured to specify Perfect Forward Secrecy (PFS) for the IPsec Security Association (SA) during IKE Phase 2 negotiation.

    PFS generates each new encryption key independently from the previous key. Without PFS, compromise of one key will compromise all communications. The Phase 2 (Quick Mode) Security Association (SA)...
    Rule Medium Severity
  • SRG-NET-000510-VPN-002160

    Group
  • The Cisco ASA must be configured to use a FIPS-validated cryptographic module to generate cryptographic hashes.

    FIPS 140-2/140-3 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data within federal systems. Unvalidated cryptography is viewed by NIST as p...
    Rule Medium Severity
  • SRG-NET-000510-VPN-002170

    Group
  • The Cisco ASA must be configured to use a FIPS-validated cryptographic module to implement IPsec encryption services.

    FIPS 140-2/140-3 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data within federal systems. Unvalidated cryptography is viewed by NIST as p...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules