I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000435-NDM-000315
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must implement service redundancy to protect against or limit the effects of common types of Denial of Service (DoS) attacks on the device itself.
<VulnDiscussion>Service redundancy, may reduce the susceptibility to some DoS attacks. Organizations must consider the need for service redu...Rule Low Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must be configured to use Junos 12.1 X46 or later to meet the minimum required version for DoD.
<VulnDiscussion>Earlier versions of Junos may have reached the end of life cycle support by the vendor. Junos 12.1X46 is not a UC APL certifi...Rule Medium Severity -
SRG-APP-000142-NDM-000245
<GroupDescription></GroupDescription>Group -
For nonlocal maintenance sessions, the Juniper SRX Services Gateway must explicitly deny the use of J-Web.
<VulnDiscussion>If unsecured functions (lacking FIPS-validated cryptographic mechanisms) are used for management sessions, the contents of th...Rule High Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must automatically terminate a network administrator session after organization-defined conditions or trigger events requiring session disconnect.
<VulnDiscussion>Automatic session termination addresses the termination of administrator-initiated logical sessions in contrast to the termin...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
For local accounts, the Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when local accounts are created.
<VulnDiscussion>An authorized insider or individual who maliciously creates a local account could gain immediate access from a remote locatio...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when the local accounts (i.e., the account of last resort or root account) are modified.
<VulnDiscussion>An authorized insider or individual who maliciously modifies a local account could gain immediate access from a remote locati...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when accounts are disabled.
<VulnDiscussion>An authorized insider or individual who maliciously disables a local account could gain immediate access from a remote locati...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate alerts to the management console and generate a log record that can be forwarded to the ISSO and designated system administrators when the local accounts (i.e., the account of last resort or root account) are deleted.
<VulnDiscussion>An authorized insider or individual who maliciously delete a local account could gain immediate access from a remote location...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate an immediate alert message to the management console for account enabling actions.
<VulnDiscussion>In order to detect and respond to events that affect network administrator accessibility and device processing, network devic...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must allow only the information system security manager (ISSM) (or administrators/roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the syslog and/or local logs.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Low Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
For local logging, the Juniper SRX Services Gateway must generate a message to the system management console when a log processing failure occurs.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Witho...Rule Low Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
In the event that communications with the events server is lost, the Juniper SRX Services Gateway must continue to queue log records locally.
<VulnDiscussion>It is critical that when the network device is at risk of failing to process logs as required, it take action to mitigate the...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must be configured to use an authentication server to centrally apply authentication and logon settings for remote and nonlocal access for device management.
<VulnDiscussion>Centralized application (e.g., TACACS+, RADIUS) of authentication settings increases the security of remote and nonlocal acce...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.
<VulnDiscussion>Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control ...Rule High Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must specify the order in which authentication servers are used.
<VulnDiscussion>Specifying an authentication order implements an authentication, authorization, and accounting methods list to be used, thus ...Rule Low Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must detect the addition of components and issue a priority 1 alert to the ISSM and SA, at a minimum.
<VulnDiscussion>The network device must automatically detect the installation of unauthorized software or hardware onto the device itself. Mo...Rule Low Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate an alarm or send an alert message to the management console when a component failure is detected.
<VulnDiscussion>Component (e.g., chassis, file storage, file corruption) failure may cause the system to become unavailable, which could resu...Rule Medium Severity -
SRG-APP-000516-NDM-000317
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must reveal log messages or management console alerts only to the ISSO, ISSM, and SA roles).
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.