Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000362-ALG-000112

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing content filtering must protect against known and unknown types of denial-of-service (DoS) attacks by employing rate-based attack prevention behavior analysis.

    &lt;VulnDiscussion&gt;If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation...
    Rule Medium Severity
  • SRG-NET-000362-ALG-000120

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must implement load balancing to limit the effects of known and unknown types of denial-of-service (DoS) attacks.

    &lt;VulnDiscussion&gt;If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Load balancin...
    Rule Medium Severity
  • SRG-NET-000192-ALG-000121

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must block outbound traffic containing known and unknown denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.

    &lt;VulnDiscussion&gt;DoS attacks can take multiple forms but have the common objective of overloading or blocking a network or host to deny or ser...
    Rule Medium Severity
  • SRG-NET-000364-ALG-000122

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must allow incoming communications only from organization-defined authorized sources routed to organization-defined authorized destinations.

    &lt;VulnDiscussion&gt;Unrestricted traffic may contain malicious traffic that poses a threat to an enclave or to other connected networks. Addition...
    Rule Medium Severity
  • SRG-NET-000365-ALG-000123

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must fail securely in the event of an operational failure.

    &lt;VulnDiscussion&gt;If a boundary protection device fails in an unsecure manner (open), information external to the boundary protection device ma...
    Rule Medium Severity
  • SRG-NET-000202-ALG-000124

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

    &lt;VulnDiscussion&gt;A deny-all, permit-by-exception network communications traffic policy ensures that only connections that are essential and ap...
    Rule Medium Severity
  • SRG-NET-000370-ALG-000125

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must identify and log internal users associated with denied outgoing communications traffic posing a threat to external information systems.

    &lt;VulnDiscussion&gt;Without identifying the users who initiated the traffic, it would be difficult to identify those responsible for the denied c...
    Rule Medium Severity
  • SRG-NET-000273-ALG-000129

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must tailor the Exceptions messages to generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Providing too much information in error messages risks compromising the data and security of the application and system. Org...
    Rule Medium Severity
  • SRG-NET-000383-ALG-000135

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing content filtering must be configured to integrate with a system-wide intrusion detection system.

    &lt;VulnDiscussion&gt;Without coordinated reporting between separate devices, it is not possible to identify the true scale and possible target of ...
    Rule Medium Severity
  • SRG-NET-000384-ALG-000136

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing content filtering must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.

    &lt;VulnDiscussion&gt;Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules