No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000512-ALG-000062
<GroupDescription></GroupDescription>Group -
The ALG must be configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices.
<VulnDiscussion>Configuring the network element to implement organization-wide security implementation guides and security checklists ensures...Rule Medium Severity -
SRG-NET-000512-ALG-000064
<GroupDescription></GroupDescription>Group -
The ALG that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as SMTP to identify attacks based on observe...Rule Medium Severity -
SRG-NET-000512-ALG-000065
<GroupDescription></GroupDescription>Group -
The ALG that intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as FTP to identify attacks based on observed...Rule Medium Severity -
SRG-NET-000512-ALG-000066
<GroupDescription></GroupDescription>Group -
The ALG that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as HTTP to identify attacks based on observe...Rule Medium Severity -
SRG-NET-000323-ALG-000067
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS must use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.
<VulnDiscussion>If information flow is not enforced based on approved authorizations, the system may become compromised. A mechanism to dete...Rule Medium Severity -
SRG-NET-000021-ALG-000068
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS must allow privileged administrators to enable/disable all security policy filters used to enforce information flow control.
<VulnDiscussion>A crucial part of any information flow control solution is the ability to enable and disable policy filters in order to respo...Rule Medium Severity -
SRG-NET-000022-ALG-000069
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS must allow privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control.
<VulnDiscussion>The use of security policy filters provides protection for the confidentiality of data by restricting the flow of data. The c...Rule Medium Severity -
SRG-NET-000324-ALG-000070
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS, when transferring information between different security domains, must use organization-defined data type identifiers to validate data essential for information flow decisions.
<VulnDiscussion>Information flow decisions based on invalid data may allow unintended and unauthorized data flows, and therefore risk the con...Rule Medium Severity -
SRG-NET-000282-ALG-000071
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS must decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains.
<VulnDiscussion>Policy enforcement mechanisms apply filtering, inspection, and/or sanitization rules to the policy-relevant subcomponents of ...Rule Medium Severity -
SRG-NET-000283-ALG-000072
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS, when transferring information between different security domains, must implement organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content.
<VulnDiscussion>Data structure and content restrictions reduce the range of potential malicious and/or unsanctioned content in cross-domain t...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.