Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000565-VPN-002400

    Group
  • The Cisco ASA VPN gateway must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gateway must implement cryptographic modules adhering to the higher standards ...
    Rule High Severity
  • SRG-NET-000337-VPN-001290

    Group
  • The Cisco ASA VPN gateway must be configured to renegotiate the IPsec Security Association after eight hours or less.

    The IPsec security association (SA) and its corresponding key will expire either after the number of seconds or amount of traffic volume has exceeded the configured limit. A new SA is negotiated be...
    Rule Medium Severity
  • SRG-NET-000337-VPN-001300

    Group
  • The Cisco ASA VPN gateway must be configured to renegotiate the IKE security association after 24 hours or less.

    When a VPN gateway creates an IPsec security association (SA), resources must be allocated to maintain the SA. These resources are wasted during periods of IPsec endpoint inactivity, which could re...
    Rule Medium Severity
  • SRG-NET-000166-VPN-000580

    Group
  • The Cisco ASA remote access VPN server must be configured to use a separate authentication server than that used for administrative access.

    The VPN interacts directly with public networks and devices and should not contain user authentication information for all users. AAA network security services provide the primary framework through...
    Rule Medium Severity
  • SRG-NET-000320-VPN-001120

    Group
  • The Cisco ASA remote access VPN server must be configured to use LDAP over SSL to determine authorization for granting access to the network.

    Protecting authentication communications between the client, the VPN Gateway, and the authentication server keeps this critical information from being exploited. In distributed information systems...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules