Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000345-ALG-000099

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing user authentication intermediary services using PKI-based user authentication must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

    &lt;VulnDiscussion&gt;Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer autho...
    Rule Medium Severity
  • SRG-NET-000349-ALG-000106

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing user authentication intermediary services must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.

    &lt;VulnDiscussion&gt;Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protoc...
    Rule Medium Severity
  • SRG-NET-000213-ALG-000107

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule High Severity
  • SRG-NET-000510-ALG-000111

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing forward proxy encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000025

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing reverse proxy encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules