Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000063-ALG-000012

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to use NIST SP 800-52 Revision 1 compliant cryptography to protect the integrity of remote access sessions to virtual servers.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-NET-000098-ALG-000056

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit information from unauthorized read access.

    &lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means...
    Rule Medium Severity
  • SRG-NET-000099-ALG-000057

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit information from unauthorized modification.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...
    Rule Medium Severity
  • SRG-NET-000100-ALG-000058

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit information from unauthorized deletion.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...
    Rule Medium Severity
  • SRG-NET-000101-ALG-000059

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit tools from unauthorized access.

    &lt;VulnDiscussion&gt;Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...
    Rule Medium Severity
  • SRG-NET-000102-ALG-000060

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit tools from unauthorized modification.

    &lt;VulnDiscussion&gt;Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...
    Rule Medium Severity
  • SRG-NET-000103-ALG-000061

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit tools from unauthorized deletion.

    &lt;VulnDiscussion&gt;Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...
    Rule Medium Severity
  • SRG-NET-000131-ALG-000085

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured so that only functions, ports, protocols, and/or services that are documented for the server/application for which the virtual servers are providing connectivity.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of th...
    Rule Medium Severity
  • SRG-NET-000131-ALG-000086

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to remove or disable any functions, ports, protocols, and/or services that are not documented as required.

    &lt;VulnDiscussion&gt;Unrelated or unneeded proxy services increase the attack vector and add excessive complexity to the securing of the ALG. Mult...
    Rule Medium Severity
  • SRG-NET-000132-ALG-000087

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocol, and Service Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules