III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000077-ALG-000046
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC, when used to load balance web applications, must enable external logging for accessing Web Application Firewall data event messages.
<VulnDiscussion>Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up t...Rule Low Severity -
SRG-NET-000088-ALG-000054
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must send an alert to, at a minimum, the ISSO and SCA when connectivity to the Syslog servers is lost.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Low Severity -
SRG-NET-000131-ALG-000085
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must not have unnecessary scripts installed.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of th...Rule Medium Severity -
SRG-NET-000131-ALG-000086
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must use DNS Proxy mode when Global Server Load Balancing is used.
<VulnDiscussion>Unrelated or unneeded proxy services increase the attack vector and add excessive complexity to the securing of the device. M...Rule Medium Severity -
SRG-NET-000132-ALG-000087
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity -
SRG-NET-000164-ALG-000100
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC when used for TLS encryption and decryption must validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.
<VulnDiscussion>A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...Rule Medium Severity -
SRG-NET-000202-ALG-000124
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must not have any unnecessary or unapproved virtual servers configured.
<VulnDiscussion>A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential...Rule Medium Severity -
SRG-NET-000273-ALG-000129
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC, when used to load balance web applications, must strip HTTP response headers.
<VulnDiscussion>Providing too much information in error messages risks compromising the data and security of the application and system. HTTP...Rule Medium Severity -
SRG-NET-000273-ALG-000129
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC, when used to load balance web applications, must replace response codes.
<VulnDiscussion>Providing too much information in error messages risks compromising the data and security of the application and system. HTTP...Rule Medium Severity -
SRG-NET-000318-ALG-000014
<GroupDescription></GroupDescription>Group -
To protect against data mining, the A10 Networks ADC must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000318-ALG-000151
<GroupDescription></GroupDescription>Group -
To protect against data mining, the A10 Networks ADC must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000318-ALG-000152
<GroupDescription></GroupDescription>Group -
To protect against data mining, the A10 Networks ADC providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000319-ALG-000015
<GroupDescription></GroupDescription>Group -
To protect against data mining, the A10 Networks ADC providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000319-ALG-000020
<GroupDescription></GroupDescription>Group -
To protect against data mining, the A10 Networks ADC providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000319-ALG-000153
<GroupDescription></GroupDescription>Group -
To protect against data mining, the A10 Networks ADC providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000355-ALG-000117
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC being used for TLS encryption and decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions.
<VulnDiscussion>Non-DoD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in p...Rule Medium Severity -
SRG-NET-000362-ALG-000112
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must protect against TCP and UDP Denial of Service (DoS) attacks by employing Source-IP based connection-rate limiting.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation ...Rule High Severity -
SRG-NET-000362-ALG-000120
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.
<VulnDiscussion>Although maintaining high availability is normally an operational consideration, load balancing is also a useful strategy in ...Rule Medium Severity -
SRG-NET-000362-ALG-000126
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must enable DDoS filters.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation ...Rule Medium Severity -
SRG-NET-000364-ALG-000122
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC, when used to load balance web applications, must examine incoming user requests against the URI White Lists.
<VulnDiscussion>Unrestricted traffic may contain malicious traffic, which poses a threat to an enclave or to other connected networks. Additi...Rule Medium Severity -
SRG-NET-000383-ALG-000135
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC, when used to load balance web applications, must enable external logging for WAF data event messages.
<VulnDiscussion>Without coordinated reporting between separate devices, it is not possible to identify the true scale and possible target of ...Rule Low Severity -
SRG-NET-000392-ALG-000141
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must enable logging for packet anomaly events.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity -
SRG-NET-000392-ALG-000142
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity -
SRG-NET-000392-ALG-000148
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC must enable logging of Denial of Service (DoS) attacks.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...Rule Medium Severity -
SRG-NET-000401-ALG-000127
<GroupDescription></GroupDescription>Group -
The A10 Networks ADC, when used for load-balancing web servers, must not allow the HTTP TRACE and OPTIONS methods.
<VulnDiscussion>HTTP offers a number of methods that can be used to perform actions on the web server. Some of these HTTP methods can be used...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.