I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000519
<GroupDescription></GroupDescription>Group -
The VPN Client must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
<VulnDiscussion>If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...Rule Medium Severity -
SRG-NET-000522
<GroupDescription></GroupDescription>Group -
For site-to-site, VPN Gateway must be configured to store only cryptographic representations of pre-shared Keys (PSKs).
<VulnDiscussion>Pre-shared keys need to be protected at all times, and encryption is the standard method for protecting passwords. If PSKs ar...Rule Medium Severity -
SRG-NET-000525
<GroupDescription></GroupDescription>Group -
The IPsec VPN must use AES256 or greater encryption for the IPsec proposal to protect the confidentiality of remote access sessions.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-NET-000530
<GroupDescription></GroupDescription>Group -
The TLS VPN Gateway that supports Government-only services must prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.
<VulnDiscussion>Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...Rule Medium Severity -
SRG-NET-000540
<GroupDescription></GroupDescription>Group -
The TLS VPN Gateway that supports citizen- or business-facing network devices must prohibit client negotiation to SSL 2.0 or SSL 3.0.
<VulnDiscussion>Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...Rule Medium Severity -
SRG-NET-000550
<GroupDescription></GroupDescription>Group -
The VPN Gateway that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) must configure SNMPv3 to use FIPS-validated AES cipher block algorithm.
<VulnDiscussion>Without device-to-device authentication, communications with malicious devices may be established. Bidirectional authenticati...Rule Medium Severity -
SRG-NET-000565
<GroupDescription></GroupDescription>Group -
The VPN remote access server must be configured use cryptographic algorithms approved by NSA to protect NSS for remote access to a classified network.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...Rule High Severity -
SRG-NET-000565
<GroupDescription></GroupDescription>Group -
The VPN gateway must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...Rule High Severity -
SRG-NET-000580
<GroupDescription></GroupDescription>Group -
The VPN Gateway must validate certificates used for Transport Layer Security (TLS) functions by performing RFC 5280-compliant certification path validation.
<VulnDiscussion>A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...Rule Medium Severity -
SRG-NET-000213
<GroupDescription></GroupDescription>Group -
The Remote Access VPN Gateway must terminate remote access network connections after an organization-defined time period.
<VulnDiscussion>This SRG requirement is in response to the DoD OIG Audit of Maintaining Cybersecurity in the Coronavirus Disease-2019 Telewor...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.