Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000364-ALG-000122

    <GroupDescription></GroupDescription>
    Group
  • The Palo Alto Networks security platform must only allow incoming communications from organization-defined authorized sources forwarded to organization-defined authorized destinations.

    &lt;VulnDiscussion&gt;Unrestricted traffic may contain malicious traffic that poses a threat to an enclave or to other connected networks. Addition...
    Rule Medium Severity
  • SRG-NET-000370-ALG-000125

    <GroupDescription></GroupDescription>
    Group
  • The Palo Alto Networks security platform must identify and log internal users associated with prohibited outgoing communications traffic.

    &lt;VulnDiscussion&gt;Without identifying the users who initiated the traffic, it would be difficult to identify those responsible for the prohibit...
    Rule Medium Severity
  • SRG-NET-000383-ALG-000135

    <GroupDescription></GroupDescription>
    Group
  • The Palo Alto Networks security platform must be configured to integrate with a system-wide intrusion detection system.

    &lt;VulnDiscussion&gt;Without coordinated reporting between separate devices, it is not possible to identify the true scale and possible target of ...
    Rule Low Severity
  • SRG-NET-000384-ALG-000136

    <GroupDescription></GroupDescription>
    Group
  • The Palo Alto Networks security platform must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.

    &lt;VulnDiscussion&gt;Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or...
    Rule Medium Severity
  • SRG-NET-000385-ALG-000137

    <GroupDescription></GroupDescription>
    Group
  • The Palo Alto Networks security platform must generate a log record when unauthorized network services are detected.

    &lt;VulnDiscussion&gt;Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or...
    Rule Medium Severity
  • SRG-NET-000385-ALG-000138

    <GroupDescription></GroupDescription>
    Group
  • The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.

    &lt;VulnDiscussion&gt;Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or...
    Rule Medium Severity
  • SRG-NET-000390-ALG-000139

    <GroupDescription></GroupDescription>
    Group
  • The Palo Alto Networks security platform must continuously monitor inbound communications traffic crossing internal security boundaries.

    &lt;VulnDiscussion&gt;If inbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output f...
    Rule Medium Severity
  • SRG-NET-000391-ALG-000140

    <GroupDescription></GroupDescription>
    Group
  • The Palo Alto Networks security platform must continuously monitor outbound communications traffic crossing internal security boundaries.

    &lt;VulnDiscussion&gt;If outbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output ...
    Rule Medium Severity
  • SRG-NET-000392-ALG-000142

    <GroupDescription></GroupDescription>
    Group
  • The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.

    &lt;VulnDiscussion&gt;Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...
    Rule Medium Severity
  • SRG-NET-000392-ALG-000143

    <GroupDescription></GroupDescription>
    Group
  • The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized privileged access is detected.

    &lt;VulnDiscussion&gt;Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules