III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000391-ALG-000140
<GroupDescription></GroupDescription>Group -
The DataPower Gateway providing content filtering must continuously monitor outbound communications traffic crossing internal security boundaries for unusual/unauthorized activities or conditions.
<VulnDiscussion>If outbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output ...Rule Medium Severity -
SRG-NET-000392-ALG-000141
<GroupDescription></GroupDescription>Group -
The DataPower Gateway providing content filtering must send an alert to, at a minimum, the ISSO and ISSM when detection events occur.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity -
SRG-NET-000392-ALG-000142
<GroupDescription></GroupDescription>Group -
The DataPower Gateway providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity -
SRG-NET-000392-ALG-000143
<GroupDescription></GroupDescription>Group -
The DataPower Gateway providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity -
SRG-NET-000392-ALG-000147
<GroupDescription></GroupDescription>Group -
The DataPower Gateway providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity -
SRG-NET-000392-ALG-000148
<GroupDescription></GroupDescription>Group -
The DataPower Gateway providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity -
SRG-NET-000392-ALG-000149
<GroupDescription></GroupDescription>Group -
The DataPower Gateway providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity -
SRG-NET-000399-ALG-000042
<GroupDescription></GroupDescription>Group -
The DataPower Gateway providing user access control intermediary services must provide the capability for authorized users to capture, record, and log all content related to a selected user session.
<VulnDiscussion>Without the capability to capture, record, and log content related to a user session, investigations into suspicious user act...Rule Medium Severity -
SRG-NET-000401-ALG-000127
<GroupDescription></GroupDescription>Group -
The DataPower Gateway must check the validity of all data inputs except those specifically identified by the organization.
<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...Rule Medium Severity -
SRG-NET-000510-ALG-000025
<GroupDescription></GroupDescription>Group -
The DataPower Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.