Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000015-ALG-000016

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.

    &lt;VulnDiscussion&gt;Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authoriz...
    Rule Medium Severity
  • SRG-NET-000018-ALG-000017

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.

    &lt;VulnDiscussion&gt;Information flow control regulates where information is allowed to travel within a network. The flow of all network traffic m...
    Rule Medium Severity
  • SRG-NET-000019-ALG-000018

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.

    &lt;VulnDiscussion&gt;Information flow control regulates where information is allowed to travel within a network and between interconnected network...
    Rule High Severity
  • SRG-NET-000041-ALG-000022

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to virtual servers.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the virtual servers ensures privacy and sec...
    Rule Low Severity
  • SRG-NET-000042-ALG-000023

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users accessing virtual servers acknowledge the usage conditions and take explicit actions to log on for further access.

    &lt;VulnDiscussion&gt;The banner must be acknowledged by the user prior to allowing the user access to virtual servers. This provides assurance tha...
    Rule Low Severity
  • SRG-NET-000043-ALG-000024

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to publicly accessible applications.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the publicly accessible network element ens...
    Rule Low Severity
  • SRG-NET-000053-ALG-000001

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to limit the number of concurrent sessions to an organization-defined number for virtual servers.

    &lt;VulnDiscussion&gt;Network element management includes the ability to control the number of users and user sessions that utilize a network eleme...
    Rule High Severity
  • SRG-NET-000061-ALG-000009

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to monitor inbound traffic for remote access policy compliance when accepting connections to virtual servers.

    &lt;VulnDiscussion&gt;Automated monitoring of remote access traffic allows organizations to detect cyber attacks and also ensure ongoing compliance...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000011

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to use encryption services that implement NIST SP 800-52 Revision 2 compliant cryptography to protect the confidentiality of connections to virtual servers.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000150

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to comply with the required TLS settings in NIST SP 800-52 Revision 1 for TLS services to virtual servers.

    &lt;VulnDiscussion&gt;NIST SP 800-52 Revision 1 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using...
    Rule Medium Severity
  • SRG-NET-000063-ALG-000012

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to use NIST SP 800-52 Revision 1 compliant cryptography to protect the integrity of remote access sessions to virtual servers.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-NET-000098-ALG-000056

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit information from unauthorized read access.

    &lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means...
    Rule Medium Severity
  • SRG-NET-000099-ALG-000057

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit information from unauthorized modification.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...
    Rule Medium Severity
  • SRG-NET-000100-ALG-000058

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit information from unauthorized deletion.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...
    Rule Medium Severity
  • SRG-NET-000101-ALG-000059

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit tools from unauthorized access.

    &lt;VulnDiscussion&gt;Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...
    Rule Medium Severity
  • SRG-NET-000102-ALG-000060

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit tools from unauthorized modification.

    &lt;VulnDiscussion&gt;Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...
    Rule Medium Severity
  • SRG-NET-000103-ALG-000061

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to protect audit tools from unauthorized deletion.

    &lt;VulnDiscussion&gt;Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...
    Rule Medium Severity
  • SRG-NET-000131-ALG-000085

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured so that only functions, ports, protocols, and/or services that are documented for the server/application for which the virtual servers are providing connectivity.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of th...
    Rule Medium Severity
  • SRG-NET-000131-ALG-000086

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to remove or disable any functions, ports, protocols, and/or services that are not documented as required.

    &lt;VulnDiscussion&gt;Unrelated or unneeded proxy services increase the attack vector and add excessive complexity to the securing of the ALG. Mult...
    Rule Medium Severity
  • SRG-NET-000132-ALG-000087

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocol, and Service Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-NET-000138-ALG-000063

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) when connecting to virtual servers.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-NET-000138-ALG-000088

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or authentication, authorization, and accounting (AAA) server) that validate user account access authorizations and privileges when providing access control to virtual servers.

    &lt;VulnDiscussion&gt;User account and privilege validation must be centralized in order to prevent unauthorized access using changed or revoked pr...
    Rule Medium Severity
  • SRG-NET-000138-ALG-000089

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation providing user authentication intermediary services must restrict user authentication traffic to specific authentication server(s) when providing access control to virtual servers.

    &lt;VulnDiscussion&gt;User authentication can be used as part of the policy filtering rule sets. Some URLs or network resources can be restricted t...
    Rule Medium Severity
  • SRG-NET-000140-ALG-000094

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation providing user authentication intermediary services must use multifactor authentication for network access to non-privileged accounts when granting access to virtual servers.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to ...
    Rule Medium Severity
  • SRG-NET-000164-ALG-000100

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must be configured to validate certificates used for TLS functions for connections to virtual servers by constructing a certification path (which includes status information) to an accepted trust anchor.

    &lt;VulnDiscussion&gt;A trust anchor is an authoritative entity represented via a public key. Within a chain of trust, the top entity to be trusted...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules