Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000192-FW-000029

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Distributed Firewall must block outbound traffic containing denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.

    &lt;VulnDiscussion&gt;DoS attacks can take multiple forms but have the common objective of overloading or blocking a network or host to deny or ser...
    Rule Medium Severity
  • SRG-NET-000202-FW-000039

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Distributed Firewall must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

    &lt;VulnDiscussion&gt;To prevent malicious or accidental leakage of traffic, organizations must implement a deny-by-default security posture at the...
    Rule Low Severity
  • SRG-NET-000333-FW-000014

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Distributed Firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries.

    &lt;VulnDiscussion&gt;Without the ability to centrally manage the content captured in the traffic log entries, identification, troubleshooting, and...
    Rule Medium Severity
  • SRG-NET-000362-FW-000028

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Distributed Firewall must employ filters that prevent or limit the effects of all types of commonly known denial-of-service (DoS) attacks, including flooding, packet sweeps, and unauthorized port scanning.

    &lt;VulnDiscussion&gt;Not configuring a key boundary security protection device, such as the firewall, against commonly known attacks is an immedia...
    Rule Medium Severity
  • SRG-NET-000392-FW-000042

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Distributed Firewall must configure SpoofGuard to block outbound IP packets that contain illegitimate packet attributes.

    &lt;VulnDiscussion&gt;SpoofGuard helps prevent a form of malicious attack called "web spoofing" or "phishing." A SpoofGuard policy blocks traffic d...
    Rule Medium Severity
  • SRG-NET-000019-FW-000003

    <GroupDescription></GroupDescription>
    Group
  • The NSX-T Distributed Firewall must verify time-based firewall rules.

    &lt;VulnDiscussion&gt;With time windows, security administrators can restrict traffic from a source or to a destination, for a specific time period...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules