Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • The Cisco ASA must be configured to generate an alert that can be forwarded as an alert to organization-defined personnel and/or firewall administrator of all log failure events.

    <VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-NET-000164-VPN-000560

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ASA must be configured to validate certificates via a trustpoint that identifies a DoD or DoD-approved certificate authority.

    &lt;VulnDiscussion&gt;Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...
    Rule Medium Severity
  • SRG-NET-000512-VPN-002220

    <GroupDescription></GroupDescription>
    Group
  • The Cisco ASA must be configured to use Internet Key Exchange (IKE) for all IPsec security associations.

    &lt;VulnDiscussion&gt;Without IKE, the Security Parameter Index (SPI) is manually specified for each security association. IKE peers will negotiate...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules