Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000392-ALG-000148

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected.

    &lt;VulnDiscussion&gt;Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...
    Rule Medium Severity
  • SRG-NET-000392-ALG-000149

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.

    &lt;VulnDiscussion&gt;Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...
    Rule Medium Severity
  • SRG-NET-000399-ALG-000042

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway providing user access control intermediary services must provide the capability for authorized users to capture, record, and log all content related to a selected user session.

    &lt;VulnDiscussion&gt;Without the capability to capture, record, and log content related to a user session, investigations into suspicious user act...
    Rule Medium Severity
  • SRG-NET-000401-ALG-000127

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway must check the validity of all data inputs except those specifically identified by the organization.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000025

    <GroupDescription></GroupDescription>
    Group
  • The DataPower Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules