Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000565

    <GroupDescription></GroupDescription>
    Group
  • The VPN gateway must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gatewa...
    Rule High Severity
  • SRG-NET-000580

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must validate certificates used for Transport Layer Security (TLS) functions by performing RFC 5280-compliant certification path validation.

    &lt;VulnDiscussion&gt;A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...
    Rule Medium Severity
  • SRG-NET-000213

    <GroupDescription></GroupDescription>
    Group
  • The Remote Access VPN Gateway must terminate remote access network connections after an organization-defined time period.

    &lt;VulnDiscussion&gt;This SRG requirement is in response to the DoD OIG Audit of Maintaining Cybersecurity in the Coronavirus Disease-2019 Telewor...
    Rule Medium Severity
  • SRG-NET-000705

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must employ organization-defined controls by type of denial of service (DoS) to achieve the DoS objective.

    &lt;VulnDiscussion&gt;DoS events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of plannin...
    Rule Medium Severity
  • SRG-NET-000715

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.

    &lt;VulnDiscussion&gt;Separating critical system components and functions from other noncritical system components and functions through separate s...
    Rule Medium Severity
  • SRG-NET-000760

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must establish organization-defined alternate communications paths for system operations organizational command and control.

    &lt;VulnDiscussion&gt;An incident, whether adversarial- or nonadversarial-based, can disrupt established communications paths used for system opera...
    Rule Medium Severity
  • SRG-NET-000345

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

    &lt;VulnDiscussion&gt;Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer autho...
    Rule Medium Severity
  • SRG-NET-000580

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must configure OCSP to ensure revoked user certificates are prohibited from establishing an allowed session.

    &lt;VulnDiscussion&gt;Situations may arise in which the certificate issued by a Certificate Authority (CA) may need to be revoked before the lifeti...
    Rule Medium Severity
  • SRG-NET-000580

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway must configure OCSP to ensure revoked machine certificates are prohibited from establishing an allowed session.

    &lt;VulnDiscussion&gt;Situations may arise in which the certificate issued by a Certificate Authority (CA) may need to be revoked before the lifeti...
    Rule Medium Severity
  • SRG-NET-000355

    <GroupDescription></GroupDescription>
    Group
  • The VPN Gateway providing authentication intermediary services must only accept end entity certificates (user or machine) issued by DOD PKI or DOD-approved PKI Certification Authorities (CAs) for the establishment of VPN sessions.

    &lt;VulnDiscussion&gt;Untrusted Certificate Authorities (CAs) can issue certificates, but they may be issued by organizations or individuals that s...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules