III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000521-ALG-000002
<GroupDescription></GroupDescription>Group -
If TLS optimization is used, the Riverbed Optimization System (RiOS) providing Signed SMB and/or Encrypted MAPI must ensure the integrity and confidentiality of data transmitted over the WAN.
<VulnDiscussion>Protecting the end-to-end security of TLS is required to ensure integrity and confidentiality of the data in transit. Signed...Rule Medium Severity -
SRG-NET-000061-ALG-000009
<GroupDescription></GroupDescription>Group -
The Riverbed Optimization System (RiOS) must be configured to ensure inbound and outbound traffic is forwarded to be inspected by the firewall and IDPS in compliance with remote access security policies.
<VulnDiscussion>Automated monitoring of remote access traffic allows organizations to detect cyber attacks and also ensure ongoing compliance...Rule Medium Severity -
SRG-NET-000062-ALG-000011
<GroupDescription></GroupDescription>Group -
If TLS WAN optimization is used, Riverbed Optimization System (RiOS) providing SSL Optimization must protect private keys ensuring that they stay in the data center by ensuring end-to-end security.
<VulnDiscussion>Protecting the end-to-end security of TLS is required to ensure integrity and confidentiality of the data in transit. The Ri...Rule Medium Severity -
SRG-NET-000062-ALG-000011
<GroupDescription></GroupDescription>Group -
If TLS optimization is used, the Riverbed Optimization System (RiOS) providing intermediary services for TLS communications traffic must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of TLS.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule Medium Severity -
SRG-NET-000062-ALG-000092
<GroupDescription></GroupDescription>Group -
If TLS optimization is used, the Riverbed Optimization System (RiOS) that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.
<VulnDiscussion>Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...Rule Medium Severity -
SRG-NET-000062-ALG-000150
<GroupDescription></GroupDescription>Group -
The Riverbed Optimization System (RiOS) that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.
<VulnDiscussion>SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthori...Rule Medium Severity -
SRG-NET-000063-ALG-000012
<GroupDescription></GroupDescription>Group -
The Riverbed Optimization System (RiOS) providing intermediary services for remote access communications traffic must use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-NET-000131-ALG-000085
<GroupDescription></GroupDescription>Group -
The Riverbed Optimization System (RiOS) must not have unrelated or unnecessary services enabled on the host.
<VulnDiscussion>Because Wan Optimization is optimally installed in the architecture at the perimeter, installation of unnecessary functions a...Rule Medium Severity -
SRG-NET-000131-ALG-000086
<GroupDescription></GroupDescription>Group -
Riverbed Optimization System (RiOS) must not have unnecessary services and functions enabled.
<VulnDiscussion>Unrelated or unneeded proxy services increase the attack vector and add excessive complexity to the securing of Riverbed Opti...Rule Medium Severity -
SRG-NET-000132-ALG-000087
<GroupDescription></GroupDescription>Group -
The Riverbed Optimization System (RiOS) must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.