Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000342

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must electronically verify the Common Access Card (CAC) credential.

    &lt;VulnDiscussion&gt;DoD has mandated the use of the CAC as the Personal Identity Verification (PIV) credential to support identity management and...
    Rule Medium Severity
  • SRG-NET-000343

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must authenticate all network-connected endpoint devices before establishing a connection.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-NET-000352

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The National Secu...
    Rule Medium Severity
  • SRG-NET-000369

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must disable split-tunneling for remote clients VPNs.

    &lt;VulnDiscussion&gt;Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to e...
    Rule Medium Severity
  • SRG-NET-000371

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway must specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation.

    &lt;VulnDiscussion&gt;PFS generates each new encryption key independently from the previous key. Without PFS, compromise of one key will compromise...
    Rule High Severity
  • SRG-NET-000371

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway and Client must be configured to protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised as unprotected communicat...
    Rule High Severity
  • SRG-NET-000400

    <GroupDescription></GroupDescription>
    Group
  • For accounts using password authentication, the site-to-site VPN Gateway must use SHA-2 or later protocol to protect the integrity of the password authentication process.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...
    Rule Medium Severity
  • SRG-NET-000492

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must generate log records when successful and/or unsuccessful VPN connection attempts occur.

    &lt;VulnDiscussion&gt;Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...
    Rule Medium Severity
  • SRG-NET-000510

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must use a FIPS-validated cryptographic module to generate cryptographic hashes.

    &lt;VulnDiscussion&gt;FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...
    Rule Medium Severity
  • SRG-NET-000510

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.

    &lt;VulnDiscussion&gt;FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...
    Rule Medium Severity
  • SRG-NET-000510

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN Gateway must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).

    &lt;VulnDiscussion&gt;Without IKE, the SPI is manually specified for each security association. IKE peers will negotiate the encryption algorithm a...
    Rule High Severity
  • SRG-NET-000518

    <GroupDescription></GroupDescription>
    Group
  • The VPN Client logout function must be configured to terminate the session on/with the VPN Gateway.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...
    Rule Medium Severity
  • SRG-NET-000519

    <GroupDescription></GroupDescription>
    Group
  • The VPN Client must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...
    Rule Medium Severity
  • SRG-NET-000522

    <GroupDescription></GroupDescription>
    Group
  • For site-to-site, VPN Gateway must be configured to store only cryptographic representations of pre-shared Keys (PSKs).

    &lt;VulnDiscussion&gt;PSKs need to be protected at all times, and encryption is the standard method for protecting passwords. If PSKs are not encry...
    Rule Medium Severity
  • SRG-NET-000525

    <GroupDescription></GroupDescription>
    Group
  • The IPsec VPN must use AES256 or greater encryption for the IPsec proposal to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-NET-000530

    <GroupDescription></GroupDescription>
    Group
  • The TLS VPN Gateway that supports Government-only services must prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.

    &lt;VulnDiscussion&gt;Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...
    Rule Medium Severity
  • SRG-NET-000540

    <GroupDescription></GroupDescription>
    Group
  • The TLS VPN Gateway that supports citizen- or business-facing network devices must prohibit client negotiation to SSL 2.0 or SSL 3.0.

    &lt;VulnDiscussion&gt;Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...
    Rule Medium Severity
  • SRG-NET-000550

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) must configure SNMPv3 to use FIPS-validated AES cipher block algorithm.

    &lt;VulnDiscussion&gt;Without device-to-device authentication, communications with malicious devices may be established. Bidirectional authenticati...
    Rule Medium Severity
  • SRG-NET-000565

    <GroupDescription></GroupDescription>
    Group
  • The VPN remote access server must be configured use cryptographic algorithms approved by NSA to protect NSS for remote access to a classified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...
    Rule High Severity
  • SRG-NET-000565

    <GroupDescription></GroupDescription>
    Group
  • The VPN gateway must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...
    Rule High Severity
  • SRG-NET-000580

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must validate certificates used for Transport Layer Security (TLS) functions by performing RFC 5280-compliant certification path validation.

    &lt;VulnDiscussion&gt;A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...
    Rule Medium Severity
  • SRG-NET-000213

    <GroupDescription></GroupDescription>
    Group
  • The Remote Access VPN Gateway must terminate remote access network connections after an organization-defined time period.

    &lt;VulnDiscussion&gt;This SRG requirement is in response to the DoD OIG Audit of Maintaining Cybersecurity in the Coronavirus Disease-2019 Telewor...
    Rule Medium Severity
  • SRG-NET-000705

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must employ organization-defined controls by type of denial of service (DoS) to achieve the DoS objective.

    &lt;VulnDiscussion&gt;DoS events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of plannin...
    Rule Medium Severity
  • SRG-NET-000715

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.

    &lt;VulnDiscussion&gt;Separating critical system components and functions from other noncritical system components and functions through separate s...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules