Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000233-ALG-000115

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to enable the secure cookie flag.

    &lt;VulnDiscussion&gt;To guard against cookie hijacking, only the BIG-IP APM controller and client must be able to view the full session ID. Sessio...
    Rule Low Severity
  • SRG-NET-000233-ALG-000115

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to disable the persistent cookie flag.

    &lt;VulnDiscussion&gt;For BIG-IP APM deployments with connectivity resources (such as Network Access, Portal Access, etc.), BIG-IP APM cookies cann...
    Rule Low Severity
  • SRG-NET-000164-ALG-000100

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must configure certificate path validation to ensure revoked user credentials are prohibited from establishing an allowed session.

    &lt;VulnDiscussion&gt;A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...
    Rule High Severity
  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must not use the On-demand Cert Auth VPE agent as part of the APM Policy Profiles.

    &lt;VulnDiscussion&gt;By requiring mutual authentication before any communication, it becomes significantly challenging for attackers to impersonat...
    Rule Medium Severity
  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to restrict a consistent inbound IP for the entire management session.

    &lt;VulnDiscussion&gt;This security measure helps limit the effects of denial-of-service attacks by employing antisession hijacking security safegu...
    Rule Medium Severity
  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to limit authenticated client sessions to initial session source IP.

    &lt;VulnDiscussion&gt;The "Restrict to Single Client IP” is a safeguard against session hijacking or cookie theft. Even if an attacker manages to s...
    Rule Low Severity
  • F5BI-AP-300158

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to set a Maximum Session Timeout value of eight hours or less.

    &lt;VulnDiscussion&gt;The Maximum Session Timeout setting configures a limit on the maximum amount of time a user's session is active without needi...
    Rule Medium Severity
  • SRG-NET-000510-ALG-000111

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to use cryptographic algorithms approved by NSA to protect NSS for remote access to a classified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...
    Rule High Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP must be configured to identify and authenticate all endpoint devices or peers before establishing a connection.

    &lt;VulnDiscussion&gt;Without identifying and authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malic...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance providing remote access intermediary services must disable split-tunneling for remote clients' VPNs.

    &lt;VulnDiscussion&gt;Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to e...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance providing remote access intermediary services must be configured to route sessions to an IDPS for inspection.

    &lt;VulnDiscussion&gt;Remote access devices, such as those providing remote access to network devices and information systems, which lack automated...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000062

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must use Always On VPN connections for remote computing.

    &lt;VulnDiscussion&gt;Allowing remote users to manually toggle a VPN connection can create critical security risks. With Always On VPN, if a secure...
    Rule Medium Severity
  • SRG-NET-000053-ALG-000001

    <GroupDescription></GroupDescription>
    Group
  • The F5 BIG-IP appliance must be configured to set the "Max In Progress Sessions per Client IP" value to 10 or an organizational-defined number.

    &lt;VulnDiscussion&gt;The "Max In Progress Sessions Per Client IP" setting in an APM Access Profile is a security configuration that limits the num...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules