III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000015-ALG-000016
<GroupDescription></GroupDescription>Group -
For User Role Firewalls, the Juniper SRX Services Gateway Firewall must employ user attribute-based security policies to enforce approved authorizations for logical access to information and system resources.
<VulnDiscussion>Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authoriz...Rule Medium Severity -
SRG-NET-000492-ALG-000027
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate log records when firewall filters, security screens and security policies are invoked and the traffic is denied or restricted.
<VulnDiscussion>Without generating log records that log usage of objects by subjects and other objects, it would be difficult to establish, c...Rule Medium Severity -
SRG-NET-000493-ALG-000028
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must generate audit records when unsuccessful attempts to access security zones occur.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Medium Severity -
SRG-NET-000333-ALG-000049
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must be configured to support centralized management and configuration of the audit log.
<VulnDiscussion>Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...Rule Medium Severity -
SRG-NET-000089-ALG-000055
<GroupDescription></GroupDescription>Group -
In the event that communications with the Syslog server is lost, the Juniper SRX Services Gateway must continue to queue traffic log records locally.
<VulnDiscussion>It is critical that when the network element is at risk of failing to process audit logs as required, it take action to mitig...Rule Medium Severity -
SRG-NET-000131-ALG-000085
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
<VulnDiscussion>Network devices are capable of providing a wide variety of functions (capabilities or processes) and services. Some of these ...Rule Medium Severity -
SRG-NET-000131-ALG-000086
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must not be configured as an NTP server since providing this network service is unrelated to the role as a firewall.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of th...Rule Medium Severity -
SRG-NET-000131-ALG-000086
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must not be configured as a DNS proxy since providing this network service is unrelated to the role as a Firewall.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of th...Rule Medium Severity -
SRG-NET-000131-ALG-000086
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must not be configured as a DHCP server since providing this network service is unrelated to the role as a Firewall.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of th...Rule Medium Severity -
SRG-NET-000132-ALG-000087
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must be configured to prohibit or restrict the use of unauthorized functions, ports, protocols, and/or services, as defined in the PPSM CAL, vulnerability assessments.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity -
SRG-NET-000213-ALG-000107
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must terminate all communications sessions associated with user traffic after 15 minutes or less of inactivity.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule Medium Severity -
SRG-NET-000362-ALG-000112
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall providing content filtering must protect against known and unknown types of denial-of-service (DoS) attacks by implementing statistics-based screens.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation ...Rule High Severity -
SRG-NET-000362-ALG-000120
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must implement load balancing on the perimeter firewall, at a minimum, to limit the effects of known and unknown types of denial-of-service (DoS) attacks on the network.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Load balancin...Rule Medium Severity -
SRG-NET-000362-ALG-000126
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must protect against known types of denial-of-service (DoS) attacks by implementing signature-based screens.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation ...Rule High Severity -
SRG-NET-000192-ALG-000121
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must block outbound traffic containing known and unknown denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.
<VulnDiscussion>DoS attacks can take multiple forms but have the common objective of overloading or blocking a network or host to deny or ser...Rule Medium Severity -
SRG-NET-000364-ALG-000122
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must only allow inbound communications from organization-defined authorized sources routed to organization-defined authorized destinations.
<VulnDiscussion>Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additio...Rule Medium Severity -
SRG-NET-000365-ALG-000123
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must be configured to fail securely in the event of an operational failure of the firewall filtering or boundary protection function.
<VulnDiscussion>If a boundary protection device fails in an unsecure manner (open), information external to the boundary protection device ma...Rule Medium Severity -
SRG-NET-000202-ALG-000124
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
<VulnDiscussion>A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential...Rule Medium Severity -
SRG-NET-000273-ALG-000129
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must configure ICMP to meet DoD requirements.
<VulnDiscussion>Providing too much information in error messages risks compromising the data and security of the application and system. Org...Rule Medium Severity -
SRG-NET-000390-ALG-000139
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must continuously monitor all inbound communications traffic for unusual/unauthorized activities or conditions.
<VulnDiscussion>If inbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output f...Rule High Severity -
SRG-NET-000391-ALG-000140
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions.
<VulnDiscussion>If outbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output ...Rule High Severity -
SRG-NET-000392-ALG-000141
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must generate an alert to, at a minimum, the ISSO and ISSM when unusual/unauthorized activities or conditions are detected during continuous monitoring of communications traffic as it traverses inbound or outbound across internal security boundaries.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity -
SRG-NET-000392-ALG-000142
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must generate an alert that can be forwarded to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources are detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity -
SRG-NET-000392-ALG-000148
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must generate an alert that can be forwarded to, at a minimum, the ISSO and ISSM when DoS incidents are detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.