Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000364-ALG-000122

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway Firewall must only allow inbound communications from organization-defined authorized sources routed to organization-defined authorized destinations.

    &lt;VulnDiscussion&gt;Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additio...
    Rule Medium Severity
  • SRG-NET-000365-ALG-000123

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway Firewall must be configured to fail securely in the event of an operational failure of the firewall filtering or boundary protection function.

    &lt;VulnDiscussion&gt;If a boundary protection device fails in an unsecure manner (open), information external to the boundary protection device ma...
    Rule Medium Severity
  • SRG-NET-000202-ALG-000124

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway Firewall must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

    &lt;VulnDiscussion&gt;A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential...
    Rule Medium Severity
  • SRG-NET-000273-ALG-000129

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway Firewall must configure ICMP to meet DoD requirements.

    &lt;VulnDiscussion&gt;Providing too much information in error messages risks compromising the data and security of the application and system. Org...
    Rule Medium Severity
  • SRG-NET-000390-ALG-000139

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway Firewall must continuously monitor all inbound communications traffic for unusual/unauthorized activities or conditions.

    &lt;VulnDiscussion&gt;If inbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output f...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules