III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must be configured to prohibit the use of unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
For nonlocal maintenance sessions, the Juniper SRX Services Gateway must remove or explicitly deny the use of nonsecure protocols.
<VulnDiscussion>If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susce...Rule Medium Severity -
SRG-APP-000395-NDM-000310
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must authenticate NTP servers before establishing a network connection using bidirectional authentication that is cryptographically based.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...Rule Medium Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
If SNMP is enabled, the Juniper SRX Services Gateway must use and securely configure SNMPv3.
<VulnDiscussion>To prevent non-secure protocol communications with the organization's local SNMPv3 services, the SNMP client on the Juniper S...Rule High Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must ensure SSH is disabled for root user logon to prevent remote access using the root account.
<VulnDiscussion>Since the identity of the root account is well-known for systems based upon Linux or UNIX and this account does not have a se...Rule Medium Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must ensure access to start a UNIX-level shell is restricted to only the root account.
<VulnDiscussion>Restricting the privilege to create a UNIX-level shell limits access to this powerful function. System administrators, regard...Rule Medium Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must ensure TCP forwarding is disabled for SSH to prevent unauthorized access.
<VulnDiscussion>Use this configuration option to prevent a user from creating an SSH tunnel over a CLI session to the Juniper SRX via SSH. Th...Rule Medium Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must be configured with only one local user account to be used as the account of last resort.
<VulnDiscussion>Without centralized management, credentials for some network devices will be forgotten, leading to delays in administration, ...Rule Medium Severity -
SRG-APP-000156-NDM-000250
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must implement replay-resistant authentication mechanisms for network access to privileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule Medium Severity -
SRG-APP-000164-NDM-000252
<GroupDescription></GroupDescription>Group -
For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce a minimum 15-character password length.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-APP-000166-NDM-000254
<GroupDescription></GroupDescription>Group -
For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by setting the password change type to character sets.
<VulnDiscussion>Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...Rule Medium Severity -
SRG-APP-000166-NDM-000254
<GroupDescription></GroupDescription>Group -
For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one upper-case character be used.
<VulnDiscussion>Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity,...Rule Medium Severity -
SRG-APP-000167-NDM-000255
<GroupDescription></GroupDescription>Group -
For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one lower-case character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000168-NDM-000256
<GroupDescription></GroupDescription>Group -
For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000169-NDM-000257
<GroupDescription></GroupDescription>Group -
For local accounts using password authentication (i.e., the root account and the account of last resort), the Juniper SRX Services Gateway must enforce password complexity by requiring at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000172-NDM-000259
<GroupDescription></GroupDescription>Group -
For local accounts using password authentication (i.e., the root account and the account of last resort) the Juniper SRX Services Gateway must use the SHA1 or later protocol for password authentication.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule Medium Severity -
SRG-APP-000411-NDM-000330
<GroupDescription></GroupDescription>Group -
For nonlocal maintenance sessions using SNMP, the Juniper SRX Services Gateway must use and securely configure SNMPv3 with SHA to protect the integrity of maintenance and diagnostic communications.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Nonlocal ma...Rule High Severity -
SRG-APP-000411-NDM-000330
<GroupDescription></GroupDescription>Group -
For nonlocal maintenance sessions using SSH, the Juniper SRX Services Gateway must securely configure SSHv2 Message Authentication Code (MAC) algorithms to protect the integrity of maintenance and diagnostic communications.
<VulnDiscussion>To protect the integrity of nonlocal maintenance sessions, SSHv2 with MAC algorithms for integrity checking must be configure...Rule Medium Severity -
SRG-APP-000412-NDM-000331
<GroupDescription></GroupDescription>Group -
For nonlocal maintenance sessions using SNMP, the Juniper SRX Services Gateway must securely configure SNMPv3 with privacy options to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-APP-000412-NDM-000331
<GroupDescription></GroupDescription>Group -
For nonlocal maintenance sessions using SSH, the Juniper SRX Services Gateway must securely configured SSHv2 with privacy options to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.
<VulnDiscussion>To protect the confidentiality of nonlocal maintenance sessions when using SSH communications, SSHv2, AES ciphers, and key-ex...Rule Medium Severity -
SRG-APP-000412-NDM-000331
<GroupDescription></GroupDescription>Group -
For nonlocal maintenance sessions, the Juniper SRX Services Gateway must ensure only zones where management functionality is desired have host-inbound-traffic system-services configured.
<VulnDiscussion>Add a firewall filter to protect the management interface. Note: The dedicated management interface (if present), and an inte...Rule Medium Severity -
SRG-APP-000186-NDM-000266
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must immediately terminate SSH network connections when the user logs off, the session abnormally terminates, or an upstream link from the managed device goes down.
<VulnDiscussion>This setting frees device resources and mitigates the risk of an unauthorized user gaining access to an open idle session. ...Rule Medium Severity -
SRG-APP-000186-NDM-000266
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must terminate the console session when the serial cable connected to the console port is unplugged.
<VulnDiscussion>If a device management session or connection remains open after management is completed, it may be hijacked by an attacker an...Rule Low Severity -
SRG-APP-000190-NDM-000267
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must terminate a device management session after 10 minutes of inactivity, except to fulfill documented and validated mission requirements.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule Medium Severity -
SRG-APP-000190-NDM-000267
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must terminate a device management session if the keep-alive count is exceeded.
<VulnDiscussion>Configuring the keep-alive for management protocols mitigates the risk of an open connection being hijacked by an attacker. ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.