No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000234
<GroupDescription></GroupDescription>Group -
The ALG must generate unique session identifiers using a FIPS 140-2 approved random number generator.
<VulnDiscussion>Sequentially generated session IDs can be easily guessed by an attacker. Employing the concept of randomness in the generatio...Rule Medium Severity -
SRG-NET-000235
<GroupDescription></GroupDescription>Group -
The ALG must fail to a secure state upon failure of initialization, shutdown, or abort actions.
<VulnDiscussion>Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized acces...Rule Medium Severity -
SRG-NET-000236
<GroupDescription></GroupDescription>Group -
In the event of a system failure of the ALG function, the ALG must save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
<VulnDiscussion>Failure in a secure state can address safety or security in accordance with the mission needs of the organization. Failure to...Rule Medium Severity -
SRG-NET-000246
<GroupDescription></GroupDescription>Group -
The ALG providing content filtering must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy.
<VulnDiscussion>Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize a...Rule Medium Severity -
SRG-NET-000248
<GroupDescription></GroupDescription>Group -
The ALG providing content filtering must be configured to perform real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed.
<VulnDiscussion>Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to rea...Rule Medium Severity -
SRG-NET-000249
<GroupDescription></GroupDescription>Group -
The ALG providing content filtering must block malicious code upon detection.
<VulnDiscussion>Taking an appropriate action based on local organizational incident handling procedures minimizes the impact of this code on ...Rule Medium Severity -
SRG-NET-000249
<GroupDescription></GroupDescription>Group -
The ALG providing content filtering must delete or quarantine malicious code in response to malicious code detection.
<VulnDiscussion>Taking an appropriate action based on local organizational incident handling procedures minimizes the impact of this code on ...Rule Medium Severity -
SRG-NET-000249
<GroupDescription></GroupDescription>Group -
The ALG providing content filtering must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection.
<VulnDiscussion>Without an alert, security personnel may be unaware of an impending failure of the audit capability; then the ability to perf...Rule Medium Severity -
SRG-NET-000251
<GroupDescription></GroupDescription>Group -
The ALG providing content filtering must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management procedures.
<VulnDiscussion>The malicious software detection functionality on network elements needs to be constantly updated in order to identify new th...Rule Medium Severity -
SRG-NET-000273
<GroupDescription></GroupDescription>Group -
The ALG must generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries.
<VulnDiscussion>Providing too much information in error messages risks compromising the data and security of the application and system. Org...Rule Medium Severity -
SRG-NET-000280
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS must enforce information flow control based on organization-defined metadata.
<VulnDiscussion>Enforcing allowed information flows based on metadata enables simpler and more effective flow control. Metadata is informatio...Rule Medium Severity -
SRG-NET-000280
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS must block the transfer of data with malformed security attribute metadata structures.
<VulnDiscussion>Enforcing allowed information flows based on metadata enables simpler and more effective flow control. Metadata is informatio...Rule Medium Severity -
SRG-NET-000282
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS must decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains.
<VulnDiscussion>Policy enforcement mechanisms apply filtering, inspection, and/or sanitization rules to the policy-relevant subcomponents of ...Rule Medium Severity -
SRG-NET-000283
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS, when transferring information between different security domains, must implement organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content.
<VulnDiscussion>Data structure and content restrictions reduce the range of potential malicious and/or unsanctioned content in cross-domain t...Rule Medium Severity -
SRG-NET-000284
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS, when transferring information between different security domains, must examine the information for the presence of organization-defined unsanctioned information.
<VulnDiscussion>Without the capability to examine information, there is no means to determine the presence of information not authorized for ...Rule Medium Severity -
SRG-NET-000285
<GroupDescription></GroupDescription>Group -
The ALG that is part of a CDS must prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains.
<VulnDiscussion>The ability to prohibit information transfer is fundamentally necessary to prevent unintended and unauthorized data flows. Fa...Rule Medium Severity -
SRG-NET-000288
<GroupDescription></GroupDescription>Group -
The ALG providing content filtering must block or restrict detected prohibited mobile code.
<VulnDiscussion>Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded an...Rule Medium Severity -
SRG-NET-000289
<GroupDescription></GroupDescription>Group -
The ALG providing content filtering must prevent the download of prohibited mobile code.
<VulnDiscussion>Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded an...Rule Medium Severity -
SRG-NET-000313
<GroupDescription></GroupDescription>Group -
The ALG providing intermediary services for remote access communications traffic must control remote access methods.
<VulnDiscussion>Remote access devices, such as those providing remote access to network devices and information systems, which lack automated...Rule Medium Severity -
SRG-NET-000314
<GroupDescription></GroupDescription>Group -
The ALG providing intermediary services for remote access communications traffic must provide the capability to immediately disconnect or disable remote access to the information system.
<VulnDiscussion>Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking progress would n...Rule Medium Severity -
SRG-NET-000318
<GroupDescription></GroupDescription>Group -
To protect against data mining, the ALG providing content filtering must prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000318
<GroupDescription></GroupDescription>Group -
To protect against data mining, the ALG providing content filtering must prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000318
<GroupDescription></GroupDescription>Group -
To protect against data mining, the ALG providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000319
<GroupDescription></GroupDescription>Group -
To protect against data mining, the ALG providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000319
<GroupDescription></GroupDescription>Group -
To protect against data mining, the ALG providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.