Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000053-ALG-000001

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.

    &lt;VulnDiscussion&gt;Network element management includes the ability to control the number of users and user sessions that utilize a network eleme...
    Rule Medium Severity
  • SRG-NET-000061-ALG-000009

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing intermediary services for remote access communications traffic must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.

    &lt;VulnDiscussion&gt;Automated monitoring of remote access traffic allows organizations to detect cyber attacks and also ensure ongoing compliance...
    Rule Medium Severity
  • SRG-NET-000313-ALG-000010

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing intermediary services for remote access communications traffic must control remote access methods.

    &lt;VulnDiscussion&gt;Remote access devices, such as those providing remote access to network devices and information systems, which lack automated...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000011

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing intermediary services for remote access communications traffic must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000150

    <GroupDescription></GroupDescription>
    Group
  • The ALG that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.

    &lt;VulnDiscussion&gt;SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthori...
    Rule Medium Severity
  • SRG-NET-000063-ALG-000012

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing intermediary services for remote access communications traffic must use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-NET-000314-ALG-000013

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing intermediary services for remote access communications traffic must provide the capability to immediately disconnect or disable remote access to the information system.

    &lt;VulnDiscussion&gt;Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking progress would n...
    Rule Medium Severity
  • SRG-NET-000318-ALG-000014

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering must prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000318-ALG-000151

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering must prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000318-ALG-000152

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000319-ALG-000015

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000319-ALG-000153

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000015-ALG-000016

    <GroupDescription></GroupDescription>
    Group
  • The ALG must enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.

    &lt;VulnDiscussion&gt;Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authoriz...
    Rule Medium Severity
  • SRG-NET-000018-ALG-000017

    <GroupDescription></GroupDescription>
    Group
  • The ALG must enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.

    &lt;VulnDiscussion&gt;Information flow control regulates where information is allowed to travel within a network. The flow of all network traffic m...
    Rule Medium Severity
  • SRG-NET-000019-ALG-000018

    <GroupDescription></GroupDescription>
    Group
  • The ALG must restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.

    &lt;VulnDiscussion&gt;Information flow control regulates where information is allowed to travel within a network and between interconnected network...
    Rule Medium Severity
  • SRG-NET-000019-ALG-000019

    <GroupDescription></GroupDescription>
    Group
  • The ALG must immediately use updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions.

    &lt;VulnDiscussion&gt;Information flow policies regarding dynamic information flow control include, for example, allowing or disallowing informatio...
    Rule Medium Severity
  • SRG-NET-000019-ALG-000021

    <GroupDescription></GroupDescription>
    Group
  • The ALG that is part of a CDS must apply information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software.

    &lt;VulnDiscussion&gt;Information flow control regulates where information is allowed to travel within a network and between interconnected network...
    Rule Medium Severity
  • SRG-NET-000041-ALG-000022

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the network ensures privacy and security no...
    Rule Medium Severity
  • SRG-NET-000042-ALG-000023

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.

    &lt;VulnDiscussion&gt;The banner must be acknowledged by the user prior to allowing the user access to the network. This provides assurance that th...
    Rule Medium Severity
  • SRG-NET-000043-ALG-000024

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services for publicly accessible applications must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the publicly accessible network element ens...
    Rule Medium Severity
  • SRG-NET-000513-ALG-000026

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to access privileges occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-NET-000492-ALG-000027

    <GroupDescription></GroupDescription>
    Group
  • The ALG must generate audit records when successful/unsuccessful attempts to access security objects occur.

    &lt;VulnDiscussion&gt;Without generating audit records that log usage of objects by subjects and other objects, it would be difficult to establish,...
    Rule Medium Severity
  • SRG-NET-000493-ALG-000028

    <GroupDescription></GroupDescription>
    Group
  • The ALG that is part of a CDS must generate audit records when successful/unsuccessful attempts to access security levels occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-NET-000494-ALG-000029

    <GroupDescription></GroupDescription>
    Group
  • The ALG must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-NET-000495-ALG-000030

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to modify privileges occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules