Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000192-ALG-000121

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway providing content filtering must not have a front side handler configured facing an internal network.

    &lt;VulnDiscussion&gt;DoS attacks can take multiple forms but have the common objective of overloading or blocking a network or host to deny or ser...
    Rule Medium Severity
  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must protect the authenticity of communications sessions.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule Medium Severity
  • SRG-NET-000231-ALG-000114

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must invalidate session identifiers upon user logout or other session termination.

    &lt;VulnDiscussion&gt;Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries from capturing and co...
    Rule Medium Severity
  • SRG-NET-000233-ALG-000115

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must recognize only system-generated session identifiers.

    &lt;VulnDiscussion&gt;Network elements (depending on function) utilize sessions and session identifiers to control application behavior and user ac...
    Rule Medium Severity
  • SRG-NET-000236-ALG-000119

    <GroupDescription></GroupDescription>
    Group
  • In the event of a system failure of the DataPower Gateway function, the DataPower Gateway must save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.

    &lt;VulnDiscussion&gt;Failure in a secure state can address safety or security in accordance with the mission needs of the organization. Failure to...
    Rule Medium Severity
  • SRG-NET-000273-ALG-000129

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must have ICMP responses disabled on all interfaces facing untrusted networks.

    &lt;VulnDiscussion&gt;Providing too much information in error messages risks compromising the data and security of the application and system. Orga...
    Rule Medium Severity
  • SRG-NET-000318-ALG-000014

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the DataPower Gateway providing content filtering must prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000318-ALG-000151

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the DataPower Gateway providing content filtering must prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000318-ALG-000152

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the DataPower Gateway providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000319-ALG-000015

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the DataPower Gateway providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules