Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000335

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must generate a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-NET-000336

    <GroupDescription></GroupDescription>
    Group
  • When communications with the Central Log Server is lost, the VPN Gateway must continue to queue traffic log records locally.

    &lt;VulnDiscussion&gt;If the system were to continue processing after audit failure, actions can be taken on the system that cannot be tracked and ...
    Rule Medium Severity
  • SRG-NET-000337

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway must renegotiate the security association after 8 hours or less, or an organization-defined period.

    &lt;VulnDiscussion&gt;The IPsec SA and its corresponding key will expire either after the number of seconds or amount of traffic volume has exceede...
    Rule Medium Severity
  • SRG-NET-000337

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must renegotiate the security association after 24 hours or less or as defined by the organization.

    &lt;VulnDiscussion&gt;When a VPN gateway creates an IPsec Security Association (SA), resources must be allocated to maintain the SA. These resource...
    Rule Medium Severity
  • SRG-NET-000341

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must accept the Common Access Card (CAC) credential.

    &lt;VulnDiscussion&gt;The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized...
    Rule Medium Severity
  • SRG-NET-000342

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must electronically verify the Common Access Card (CAC) credential.

    &lt;VulnDiscussion&gt;DoD has mandated the use of the CAC as the Personal Identity Verification (PIV) credential to support identity management and...
    Rule Medium Severity
  • SRG-NET-000343

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must authenticate all network-connected endpoint devices before establishing a connection.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-NET-000352

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The National Secu...
    Rule Medium Severity
  • SRG-NET-000369

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must disable split-tunneling for remote clients VPNs.

    &lt;VulnDiscussion&gt;Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to e...
    Rule Medium Severity
  • SRG-NET-000371

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway must specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation.

    &lt;VulnDiscussion&gt;PFS generates each new encryption key independently from the previous key. Without PFS, compromise of one key will compromise...
    Rule High Severity
  • SRG-NET-000371

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway and Client must be configured to protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised as unprotected communicat...
    Rule High Severity
  • SRG-NET-000375

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway must use Encapsulating Security Payload (ESP) in tunnel mode for establishing secured paths to transport traffic between the organization's sites or between a gateway and remote end-stations.

    &lt;VulnDiscussion&gt;ESP provides confidentiality, data origin authentication, integrity, and anti-replay services within the IPsec suite of proto...
    Rule Medium Severity
  • SRG-NET-000400

    <GroupDescription></GroupDescription>
    Group
  • For accounts using password authentication, the site-to-site VPN Gateway must use SHA-2 or later protocol to protect the integrity of the password authentication process.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...
    Rule Medium Severity
  • SRG-NET-000492

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must generate log records when successful and/or unsuccessful VPN connection attempts occur.

    &lt;VulnDiscussion&gt;Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...
    Rule Medium Severity
  • SRG-NET-000510

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must use a FIPS-validated cryptographic module to generate cryptographic hashes.

    &lt;VulnDiscussion&gt;FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...
    Rule Medium Severity
  • SRG-NET-000510

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.

    &lt;VulnDiscussion&gt;FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...
    Rule Medium Severity
  • SRG-NET-000510

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).

    &lt;VulnDiscussion&gt;Without IKE, the SPI is manually specified for each security association. IKE peers will negotiate the encryption algorithm a...
    Rule High Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must not accept certificates that have been revoked when using PKI for authentication.

    &lt;VulnDiscussion&gt;Situations may arise in which the certificate issued by a Certificate Authority (CA) may need to be revoked before the lifeti...
    Rule High Severity
  • SRG-NET-000518

    <GroupDescription></GroupDescription>
    Group
  • The VPN Client logout function must be configured to terminate the session on/with the VPN Gateway.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...
    Rule Medium Severity
  • SRG-NET-000519

    <GroupDescription></GroupDescription>
    Group
  • The VPN Client must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...
    Rule Medium Severity
  • SRG-NET-000522

    <GroupDescription></GroupDescription>
    Group
  • For site-to-site, VPN Gateway must be configured to store only cryptographic representations of pre-shared Keys (PSKs).

    &lt;VulnDiscussion&gt;Pre-shared keys need to be protected at all times, and encryption is the standard method for protecting passwords. If PSKs ar...
    Rule Medium Severity
  • SRG-NET-000525

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN must use AES256 or greater encryption for the IPsec proposal to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-NET-000530

    <GroupDescription></GroupDescription>
    Group
  • The TLS VPN Gateway that supports Government-only services must prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.

    &lt;VulnDiscussion&gt;Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...
    Rule Medium Severity
  • SRG-NET-000540

    <GroupDescription></GroupDescription>
    Group
  • The TLS VPN Gateway that supports citizen- or business-facing network devices must prohibit client negotiation to SSL 2.0 or SSL 3.0.

    &lt;VulnDiscussion&gt;Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules