Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000062

    <GroupDescription></GroupDescription>
    Group
  • The TLS VPN Gateway must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during transmission for remote access connections.

    &lt;VulnDiscussion&gt;Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...
    Rule High Severity
  • SRG-NET-000063

    <GroupDescription></GroupDescription>
    Group
  • The remote access VPN Gateway must use a digital signature generated using FIPS-validated algorithms and an approved hash function to protect the integrity of TLS remote access sessions.

    &lt;VulnDiscussion&gt;Without integrity protection, unauthorized changes may be made to the log files and reliable forensic analysis and discovery ...
    Rule Medium Severity
  • SRG-NET-000063

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must be configured to use IPsec with SHA-2 at 384 bits or greater for hashing to protect the integrity of remote access sessions.

    &lt;VulnDiscussion&gt;Without strong cryptographic integrity protections, information can be altered by unauthorized users without detection. SHA-...
    Rule Medium Severity
  • SRG-NET-000074

    <GroupDescription></GroupDescription>
    Group
  • The IPSec VPN must be configured to use a Diffie-Hellman (DH) Group of 16 or greater for Internet Key Exchange (IKE) Phase 1.

    &lt;VulnDiscussion&gt;Use of an approved DH algorithm ensures the IKE (Phase 1) proposal uses FIPS-validated key management techniques and processe...
    Rule High Severity
  • SRG-NET-000075

    <GroupDescription></GroupDescription>
    Group
  • If the site-to-site VPN implementation uses L2TP, L2TPv3 sessions must be authenticated prior to transporting traffic.

    &lt;VulnDiscussion&gt;L2TPv3 sessions can be used to transport layer-2 protocols across an IP backbone. These protocols were intended for link-loca...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules