I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000019-ALG-000019
<GroupDescription></GroupDescription>Group -
Kona Site Defender must immediately apply updates to the Kona Rule Set to block designated traffic of interest in response to new or emerging threats.
<VulnDiscussion>Information flow policies regarding dynamic information flow control include, for example, allowing or disallowing informatio...Rule High Severity -
SRG-NET-000019-ALG-000019
<GroupDescription></GroupDescription>Group -
Kona Site Defender must immediately use updates made to policy enforcement mechanisms to block traffic from organizationally defined geographic regions.
<VulnDiscussion>Information flow policies regarding dynamic information flow control include, for example, allowing or disallowing informatio...Rule Medium Severity -
SRG-NET-000019-ALG-000019
<GroupDescription></GroupDescription>Group -
Kona Site Defender must immediately use updates made to policy enforcement mechanisms to block traffic from organizationally defined IP addresses (i.e., IP blacklist).
<VulnDiscussion>Information flow policies regarding dynamic information flow control include, for example, allowing or disallowing informatio...Rule Medium Severity -
SRG-NET-000019-ALG-000019
<GroupDescription></GroupDescription>Group -
Kona Site Defender must immediately use updates made to policy enforcement mechanisms to allow traffic from organizationally defined IP addresses (i.e., IP whitelist).
<VulnDiscussion>Information flow policies regarding dynamic information flow control include, for example, allowing or disallowing informatio...Rule Medium Severity -
SRG-NET-000062-ALG-000150
<GroupDescription></GroupDescription>Group -
Kona Site Defender that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.
<VulnDiscussion>NIST SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unau...Rule High Severity -
SRG-NET-000318-ALG-000014
<GroupDescription></GroupDescription>Group -
To protect against data mining, Kona Site Defender providing content filtering must prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000318-ALG-000151
<GroupDescription></GroupDescription>Group -
To protect against data mining, Kona Site Defender providing content filtering must prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000318-ALG-000152
<GroupDescription></GroupDescription>Group -
To protect against data mining, Kona Site Defender providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000319-ALG-000015
<GroupDescription></GroupDescription>Group -
To protect against data mining, Kona Site Defender providing content filtering must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000319-ALG-000020
<GroupDescription></GroupDescription>Group -
To protect against data mining, Kona Site Defender providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.