Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000061-ALG-000009

    <GroupDescription></GroupDescription>
    Group
  • If Symantec ProxySG filters externally initiated traffic, reverse proxy services must be configured.

    &lt;VulnDiscussion&gt;Automated monitoring of remote access traffic allows organizations to detect cyber attacks and also ensure ongoing compliance...
    Rule Medium Severity
  • SRG-NET-000061-ALG-000009

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing intermediary services for remote access communications traffic must ensure outbound traffic is monitored for compliance with remote access security policies.

    &lt;VulnDiscussion&gt;Automated monitoring of remote access traffic allows organizations to detect cyber attacks and also ensure ongoing compliance...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000150

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing forward proxy intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.

    &lt;VulnDiscussion&gt;SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthori...
    Rule High Severity
  • SRG-NET-000062-ALG-000150

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing reverse proxy intermediary services for TLS must be configured to version 1.1 or higher with an approved cipher suite.

    &lt;VulnDiscussion&gt;SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthori...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000092

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG storing secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules