II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000164-ALG-000100
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must configure OCSP to ensure revoked user credentials are prohibited from establishing an allowed session.
<VulnDiscussion>A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...Rule Medium Severity -
SRG-NET-000164-ALG-000100
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must configure OCSP to ensure revoked machine credentials are prohibited from establishing an allowed session.
<VulnDiscussion>A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...Rule Medium Severity -
SRG-NET-000230-ALG-000113
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must not use the On-Demand Cert Auth VPE agent as part of the APM Policy Profiles.
<VulnDiscussion>By requiring mutual authentication before any communication, it becomes significantly challenging for attackers to impersonat...Rule Medium Severity -
SRG-NET-000355-ALG-000117
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance APM Access Policies that grant access to web application resources must allow only client certificates that have the User Persona Name (UPN) value in the User Persona Client Certificates.
<VulnDiscussion>To enhance the security, it is advisable to append additional checks and APM Deny/Fallback branches to APM Access Profiles in...Rule Low Severity -
SRG-NET-000230-ALG-000113
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must be configured to limit authenticated client sessions to initial session source IP.
<VulnDiscussion>The "Restrict to Single Client IP" is a safeguard against session hijacking or cookie theft. Even if an attacker manages to s...Rule Low Severity -
SRG-NET-000053-ALG-000001
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must be configured to set the "Max In Progress Sessions per Client IP" value to 10 or less.
<VulnDiscussion>The "Max In Progress Sessions Per Client IP" setting in an APM Access Pro?le is a security con?guration that limits the numbe...Rule Low Severity -
SRG-NET-000015-ALG-000016
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must enforce approved authorizations for logical access to resources by explicitly configuring assigned resources with an authorization list.
<VulnDiscussion>Authentication alone must not be sufficient to assign APM resources to a connecting client. Access to APM resources (e.g., Po...Rule Medium Severity -
SRG-NET-000233-ALG-000115
<GroupDescription></GroupDescription>Group -
When the Access Profile Type is LTM+APM and it is not using any connectivity resources (such as Network Access, Portal Access, etc.) in the VPE, the F5 BIG-IP appliance must be configured to enable the HTTP Only flag.
<VulnDiscussion>To guard against cookie hijacking, only the BIG-IP APM controller and client must be able to view the full session ID. Settin...Rule Low Severity -
SRG-NET-000233-ALG-000115
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must be configured to enable the "Secure" cookie flag.
<VulnDiscussion>To guard against cookie hijacking, only the BIG-IP APM controller and client must be able to view the full session ID. Sessio...Rule Low Severity -
SRG-NET-000233-ALG-000115
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must be configured to disable the "Persistent" cookie flag.
<VulnDiscussion>For BIG-IP APM deployments with connectivity resources (such as Network Access, Portal Access, etc.), BIG-IP APM cookies cann...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.