III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000318-ALG-000151
<GroupDescription></GroupDescription>Group -
To protect against data mining, the Palo Alto Networks security platform must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
<VulnDiscussion>Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...Rule Medium Severity -
SRG-NET-000334-ALG-000050
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must off-load audit records onto a different system or media than the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-NET-000355-ALG-000117
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform being used for TLS/SSL decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions.
<VulnDiscussion>Non-DoD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in p...Rule Medium Severity -
SRG-NET-000362-ALG-000112
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must block outbound traffic containing denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources may be unavailable to users. Installation o...Rule High Severity -
SRG-NET-000362-ALG-000126
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must use a Vulnerability Protection Profile that blocks any critical, high, or medium threats.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources may be unavailable to users. Installation...Rule Medium Severity -
SRG-NET-000364-ALG-000122
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must only allow incoming communications from organization-defined authorized sources forwarded to organization-defined authorized destinations.
<VulnDiscussion>Unrestricted traffic may contain malicious traffic that poses a threat to an enclave or to other connected networks. Addition...Rule Medium Severity -
SRG-NET-000370-ALG-000125
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must identify and log internal users associated with prohibited outgoing communications traffic.
<VulnDiscussion>Without identifying the users who initiated the traffic, it would be difficult to identify those responsible for the prohibit...Rule Medium Severity -
SRG-NET-000383-ALG-000135
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must be configured to integrate with a system-wide intrusion detection system.
<VulnDiscussion>Without coordinated reporting between separate devices, it is not possible to identify the true scale and possible target of ...Rule Low Severity -
SRG-NET-000384-ALG-000136
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.
<VulnDiscussion>Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or...Rule Medium Severity -
SRG-NET-000385-ALG-000137
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must generate a log record when unauthorized network services are detected.
<VulnDiscussion>Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or...Rule Medium Severity -
SRG-NET-000385-ALG-000138
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
<VulnDiscussion>Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or...Rule Medium Severity -
SRG-NET-000390-ALG-000139
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must continuously monitor inbound communications traffic crossing internal security boundaries.
<VulnDiscussion>If inbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output f...Rule Medium Severity -
SRG-NET-000391-ALG-000140
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must continuously monitor outbound communications traffic crossing internal security boundaries.
<VulnDiscussion>If outbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output ...Rule Medium Severity -
SRG-NET-000392-ALG-000142
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...Rule Medium Severity -
SRG-NET-000392-ALG-000143
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized privileged access is detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...Rule Medium Severity -
SRG-NET-000392-ALG-000147
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized non-privileged access is detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...Rule Medium Severity -
SRG-NET-000392-ALG-000148
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must generate a log record that can be used to send an alert to, at a minimum, the information system security officer (ISSO) and information system security manager (ISSM) when denial-of-service (DoS) incidents are detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...Rule Medium Severity -
SRG-NET-000392-ALG-000149
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...Rule Medium Severity -
SRG-NET-000402-ALG-000130
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must block traceroutes and ICMP probes originating from untrusted networks (e.g., ISP and other non-DoD networks).
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-NET-000510-ALG-000025
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...Rule Medium Severity -
SRG-NET-000510-ALG-000111
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform, if used for TLS/SSL decryption, must use NIST FIPS-validated cryptography to implement encryption.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...Rule Medium Severity -
SRG-NET-000511-ALG-000051
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must, at a minimum, off-load threat and traffic log records onto a centralized log server in real time.
<VulnDiscussion>Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also prot...Rule Low Severity -
SRG-NET-000512-ALG-000064
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must inspect inbound and outbound SMTP and Extended SMTP communications traffic (if authorized) for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as SMTP to identify attacks based on observe...Rule Medium Severity -
SRG-NET-000512-ALG-000065
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must inspect inbound and outbound FTP and FTPS communications traffic (if authorized) for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as FTP to identify attacks based on observed...Rule Medium Severity -
SRG-NET-000512-ALG-000066
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must inspect inbound and outbound HTTP traffic (if authorized) for protocol compliance and protocol anomalies.
<VulnDiscussion>Application protocol anomaly detection examines application layer protocols such as HTTP to identify attacks based on observe...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.