III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000392-ALG-000147
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized non-privileged access is detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...Rule Medium Severity -
SRG-NET-000392-ALG-000148
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must generate a log record that can be used to send an alert to, at a minimum, the information system security officer (ISSO) and information system security manager (ISSM) when denial-of-service (DoS) incidents are detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...Rule Medium Severity -
SRG-NET-000392-ALG-000149
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.
<VulnDiscussion>Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this dela...Rule Medium Severity -
SRG-NET-000402-ALG-000130
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform must block traceroutes and ICMP probes originating from untrusted networks (e.g., ISP and other non-DoD networks).
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-NET-000510-ALG-000025
<GroupDescription></GroupDescription>Group -
The Palo Alto Networks security platform providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.