Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000505-ALG-000039

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000025

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000040

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000065

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway that provides intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.

    &lt;VulnDiscussion&gt;Application protocol anomaly detection examines application layer protocols such as FTP to identify attacks based on observed...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000066

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.

    &lt;VulnDiscussion&gt;Application protocol anomaly detection examines application layer protocols such as HTTP to identify attacks based on observe...
    Rule Medium Severity
  • SRG-NET-000517-ALG-000006

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing user access control intermediary services must automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity
  • SRG-NET-000518-ALG-000007

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing user access control intermediary services must provide a logoff capability for user-initiated communications sessions.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker. However, for some ty...
    Rule Medium Severity
  • SRG-NET-000519-ALG-000008

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing user access control intermediary services must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000111

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The network elemen...
    Rule Medium Severity
  • SRG-NET-000511-ALG-000051

    <GroupDescription></GroupDescription>
    Group
  • The CA API Gateway must off-load audit records onto a centralized log server in real time.

    &lt;VulnDiscussion&gt;Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also prot...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules