III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000342
<GroupDescription></GroupDescription>Group -
The VPN Gateway must electronically verify the Common Access Card (CAC) credential.
<VulnDiscussion>DoD has mandated the use of the CAC as the Personal Identity Verification (PIV) credential to support identity management and...Rule Medium Severity -
SRG-NET-000343
<GroupDescription></GroupDescription>Group -
The VPN Gateway must authenticate all network-connected endpoint devices before establishing a connection.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...Rule Medium Severity -
SRG-NET-000352
<GroupDescription></GroupDescription>Group -
The VPN Gateway must use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The National Secu...Rule Medium Severity -
SRG-NET-000369
<GroupDescription></GroupDescription>Group -
The VPN Gateway must disable split-tunneling for remote clients VPNs.
<VulnDiscussion>Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to e...Rule Medium Severity -
SRG-NET-000371
<GroupDescription></GroupDescription>Group -
The IPsec VPN Gateway must specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation.
<VulnDiscussion>PFS generates each new encryption key independently from the previous key. Without PFS, compromise of one key will compromise...Rule High Severity -
SRG-NET-000371
<GroupDescription></GroupDescription>Group -
The VPN Gateway and Client must be configured to protect the confidentiality and integrity of transmitted information.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised as unprotected communicat...Rule High Severity -
SRG-NET-000400
<GroupDescription></GroupDescription>Group -
For accounts using password authentication, the site-to-site VPN Gateway must use SHA-2 or later protocol to protect the integrity of the password authentication process.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule Medium Severity -
SRG-NET-000492
<GroupDescription></GroupDescription>Group -
The VPN Gateway must generate log records when successful and/or unsuccessful VPN connection attempts occur.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Medium Severity -
SRG-NET-000510
<GroupDescription></GroupDescription>Group -
The VPN Gateway must use a FIPS-validated cryptographic module to generate cryptographic hashes.
<VulnDiscussion>FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...Rule Medium Severity -
SRG-NET-000510
<GroupDescription></GroupDescription>Group -
The VPN Gateway must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.
<VulnDiscussion>FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.