III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000061-ALG-000009
<GroupDescription></GroupDescription>Group -
If Symantec ProxySG filters externally initiated traffic, reverse proxy services must be configured.
<VulnDiscussion>Automated monitoring of remote access traffic allows organizations to detect cyber attacks and also ensure ongoing compliance...Rule Medium Severity -
SRG-NET-000061-ALG-000009
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing intermediary services for remote access communications traffic must ensure outbound traffic is monitored for compliance with remote access security policies.
<VulnDiscussion>Automated monitoring of remote access traffic allows organizations to detect cyber attacks and also ensure ongoing compliance...Rule Medium Severity -
SRG-NET-000062-ALG-000150
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing forward proxy intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.
<VulnDiscussion>SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthori...Rule High Severity -
SRG-NET-000062-ALG-000150
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing reverse proxy intermediary services for TLS must be configured to version 1.1 or higher with an approved cipher suite.
<VulnDiscussion>SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthori...Rule Medium Severity -
SRG-NET-000062-ALG-000092
<GroupDescription></GroupDescription>Group -
Symantec ProxySG storing secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.
<VulnDiscussion>Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...Rule Medium Severity -
SRG-NET-000015-ALG-000016
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must implement security policies that enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
<VulnDiscussion>Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authoriz...Rule High Severity -
SRG-NET-000019-ALG-000018
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.
<VulnDiscussion>Information flow control regulates where information is allowed to travel within a network and between interconnected network...Rule High Severity -
SRG-NET-000018-ALG-000017
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.
<VulnDiscussion>Information flow control regulates where information is allowed to travel within a network. The flow of all network traffic m...Rule Medium Severity -
SRG-NET-000019-ALG-000019
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must immediately use updates made to policy enforcement mechanisms such as policies and rules.
<VulnDiscussion>Information flow policies regarding dynamic information flow control include, for example, allowing or disallowing informatio...Rule Medium Severity -
SRG-NET-000041-ALG-000022
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing user access control intermediary services must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the network ensures that privacy and securi...Rule Medium Severity -
SRG-NET-000043-ALG-000024
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing user access control intermediary services for publicly accessible applications must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the publicly accessible network element ens...Rule Medium Severity -
SRG-NET-000503-ALG-000038
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-NET-000505-ALG-000039
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-NET-000513-ALG-000026
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to access web resources occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-NET-000074-ALG-000043
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must produce audit records containing information to establish what type of events occurred.
<VulnDiscussion>Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events l...Rule Medium Severity -
SRG-NET-000075-ALG-000044
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must produce audit records containing information to establish when (date and time) the events occurred.
<VulnDiscussion>Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to...Rule Medium Severity -
SRG-NET-000076-ALG-000045
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must produce audit records containing information to establish where the events occurred.
<VulnDiscussion>Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up t...Rule Medium Severity -
SRG-NET-000077-ALG-000046
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must produce audit records containing information to establish the source of the events.
<VulnDiscussion>Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up...Rule Medium Severity -
SRG-NET-000078-ALG-000047
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must produce audit records containing information to establish the outcome of the events.
<VulnDiscussion>Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attac...Rule Medium Severity -
SRG-NET-000079-ALG-000048
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must generate audit records containing information to establish the identity of any individual or process associated with the event.
<VulnDiscussion>Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associ...Rule Medium Severity -
SRG-NET-000334-ALG-000050
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must use a centralized log server.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-NET-000511-ALG-000051
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must be configured to send the access logs to the centralized log server continuously.
<VulnDiscussion>Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also prot...Rule Medium Severity -
SRG-NET-000335-ALG-000053
<GroupDescription></GroupDescription>Group -
Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.
<VulnDiscussion>Without a real-time alert, security personnel may be unaware of an impending failure of the audit capability and system opera...Rule Medium Severity -
SRG-NET-000512-ALG-000065
<GroupDescription></GroupDescription>Group -
The reverse proxy Symantec ProxySG providing intermediary services for FTP must inspect inbound FTP communications traffic for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as FTP to identify attacks based on observed...Rule Medium Severity -
SRG-NET-000512-ALG-000065
<GroupDescription></GroupDescription>Group -
Symantec ProxySG providing intermediary services for FTP must inspect outbound FTP communications traffic for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as FTP to identify attacks based on observed...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.