I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000335
<GroupDescription></GroupDescription>Group -
The VPN Gateway must generate a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-NET-000336
<GroupDescription></GroupDescription>Group -
When communications with the Central Log Server is lost, the VPN Gateway must continue to queue traffic log records locally.
<VulnDiscussion>If the system were to continue processing after audit failure, actions can be taken on the system that cannot be tracked and ...Rule Medium Severity -
SRG-NET-000337
<GroupDescription></GroupDescription>Group -
The IPsec VPN Gateway must renegotiate the security association after 8 hours or less, or an organization-defined period.
<VulnDiscussion>The IPsec SA and its corresponding key will expire either after the number of seconds or amount of traffic volume has exceede...Rule Medium Severity -
SRG-NET-000337
<GroupDescription></GroupDescription>Group -
The VPN Gateway must renegotiate the security association after 24 hours or less or as defined by the organization.
<VulnDiscussion>When a VPN gateway creates an IPsec Security Association (SA), resources must be allocated to maintain the SA. These resource...Rule Medium Severity -
SRG-NET-000341
<GroupDescription></GroupDescription>Group -
The VPN Gateway must accept the Common Access Card (CAC) credential.
<VulnDiscussion>The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized...Rule Medium Severity -
SRG-NET-000342
<GroupDescription></GroupDescription>Group -
The VPN Gateway must electronically verify the Common Access Card (CAC) credential.
<VulnDiscussion>DoD has mandated the use of the CAC as the Personal Identity Verification (PIV) credential to support identity management and...Rule Medium Severity -
SRG-NET-000343
<GroupDescription></GroupDescription>Group -
The VPN Gateway must authenticate all network-connected endpoint devices before establishing a connection.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...Rule Medium Severity -
SRG-NET-000352
<GroupDescription></GroupDescription>Group -
The VPN Gateway must use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The National Secu...Rule Medium Severity -
SRG-NET-000369
<GroupDescription></GroupDescription>Group -
The VPN Gateway must disable split-tunneling for remote clients VPNs.
<VulnDiscussion>Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to e...Rule Medium Severity -
SRG-NET-000371
<GroupDescription></GroupDescription>Group -
The IPsec VPN Gateway must specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation.
<VulnDiscussion>PFS generates each new encryption key independently from the previous key. Without PFS, compromise of one key will compromise...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.