Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000164

    <GroupDescription></GroupDescription>
    Group
  • The ALG that provides intermediary services for TLS must validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.

    &lt;VulnDiscussion&gt;A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...
    Rule Medium Severity
  • SRG-NET-000166

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing PKI-based user authentication intermediary services must map authenticated identities to the user account.

    &lt;VulnDiscussion&gt;Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure on...
    Rule Medium Severity
  • SRG-NET-000169

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user authentication intermediary services must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity f...
    Rule Medium Severity
  • SRG-NET-000192

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing content filtering must block outbound traffic containing known and unknown DoS attacks to protect against the use of internal information systems to launch any Denial of Service (DoS) attacks against other networks or endpoints.

    &lt;VulnDiscussion&gt;DoS attacks can take multiple forms but have the common objective of overloading or blocking a network or host to deny or ser...
    Rule Medium Severity
  • SRG-NET-000202

    <GroupDescription></GroupDescription>
    Group
  • The ALG must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

    &lt;VulnDiscussion&gt;A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential...
    Rule Medium Severity
  • SRG-NET-000213

    <GroupDescription></GroupDescription>
    Group
  • The ALG must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-NET-000228

    <GroupDescription></GroupDescription>
    Group
  • The ALG must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.

    &lt;VulnDiscussion&gt;Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded an...
    Rule Medium Severity
  • SRG-NET-000230

    <GroupDescription></GroupDescription>
    Group
  • The ALG must protect the authenticity of communications sessions.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule Medium Severity
  • SRG-NET-000231

    <GroupDescription></GroupDescription>
    Group
  • The ALG must invalidate session identifiers upon user logout or other session termination.

    &lt;VulnDiscussion&gt;Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries from capturing and co...
    Rule Medium Severity
  • SRG-NET-000233

    <GroupDescription></GroupDescription>
    Group
  • The ALG must recognize only system-generated session identifiers.

    &lt;VulnDiscussion&gt;Network elements (depending on function) utilize sessions and session identifiers to control application behavior and user ac...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules