Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000015

    Group
  • The ALG must enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.

    Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authorization-based access control could result in the immediate compromise and ...
    Rule Medium Severity
  • SRG-NET-000018

    Group
  • The ALG must enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.

    Information flow control regulates where information is allowed to travel within a network. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptabl...
    Rule Medium Severity
  • SRG-NET-000019

    Group
  • The ALG must restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.

    Information flow control regulates where information is allowed to travel within a network and between interconnected networks. Blocking or restricting detected harmful or suspicious communications...
    Rule Medium Severity
  • SRG-NET-000019

    Group
  • The ALG must immediately use updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions.

    Information flow policies regarding dynamic information flow control include, for example, allowing or disallowing information flows based on changes to the PPSM CAL, vulnerability assessments, or ...
    Rule Medium Severity
  • SRG-NET-000019

    Group
  • The ALG that is part of a CDS must apply information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software.

    Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so i...
    Rule Medium Severity
  • SRG-NET-000021

    Group
  • The ALG that is part of a CDS must allow privileged administrators to enable/disable all security policy filters used to enforce information flow control.

    A crucial part of any information flow control solution is the ability to enable and disable policy filters in order to respond to changes in organizational security posture and mission conditions....
    Rule Medium Severity
  • SRG-NET-000022

    Group
  • The ALG that is part of a CDS must allow privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control.

    The use of security policy filters provides protection for the confidentiality of data by restricting the flow of data. The capability to configure policy filters allows the ALG to enforce more gra...
    Rule Medium Severity
  • SRG-NET-000029

    Group
  • The ALG that is part of a CDS must enforce dynamic traffic flow control based on organization-defined policies.

    Information flow policies regarding dynamic information flow control include allowing or disallowing information flows based on changing conditions or mission/operational considerations. Changing c...
    Rule Medium Severity
  • SRG-NET-000032

    Group
  • The ALG that is part of a CDS must enforce organization-defined one-way information flows using hardware mechanisms.

    Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so i...
    Rule Medium Severity
  • SRG-NET-000033

    Group
  • The ALG that is part of a CDS must enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows.

    The use of security policy filters provides protection for the confidentiality of data by restricting the flow of data. Configure organization-defined specific filters and their order of execution...
    Rule Medium Severity
  • SRG-NET-000041

    Group
  • The ALG providing user access control intermediary services must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.

    Display of a standardized and approved use notification before granting access to the network ensures privacy and security notification verbiage used is consistent with applicable federal laws, Exe...
    Rule Medium Severity
  • SRG-NET-000042

    Group
  • The ALG providing user access control intermediary services must retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.

    The banner must be acknowledged by the user prior to allowing the user access to the network. This provides assurance that the user has seen the message and accepted the conditions for access. If t...
    Rule Medium Severity
  • SRG-NET-000043

    Group
  • The ALG providing user access control intermediary services for publicly accessible applications must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.

    Display of a standardized and approved use notification before granting access to the publicly accessible network element ensures privacy and security notification verbiage used is consistent with ...
    Rule Medium Severity
  • SRG-NET-000053

    Group
  • The ALG providing user access control intermediary services must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.

    Network element management includes the ability to control the number of users and user sessions that utilize a network element. Limiting the number of current sessions per user is helpful in limit...
    Rule Medium Severity
  • SRG-NET-000061

    Group
  • The ALG providing intermediary services for remote access communications traffic must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.

    Automated monitoring of remote access traffic allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by inspecting connection activities of remo...
    Rule Medium Severity
  • SRG-NET-000062

    Group
  • The ALG providing intermediary services for remote access communications traffic must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.

    Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information s...
    Rule Medium Severity
  • SRG-NET-000062

    Group
  • The ALG that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.

    Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Compromise of private key data allows an adversary to impersonate the key ...
    Rule Medium Severity
  • SRG-NET-000062

    Group
  • The ALG that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.

    SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthorized versions or incorrectly configuring protocol negotiation makes the g...
    Rule Medium Severity
  • SRG-NET-000063

    Group
  • The ALG providing intermediary services for remote access communications traffic must use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access is access to DoD-nonpublic information systems by an authorized user ...
    Rule Medium Severity
  • SRG-NET-000074

    Group
  • The ALG must produce audit records containing information to establish what type of events occurred.

    Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit record content that may be nece...
    Rule Medium Severity
  • SRG-NET-000075

    Group
  • The ALG must produce audit records containing information to establish when (date and time) the events occurred.

    Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment, ...
    Rule Medium Severity
  • SRG-NET-000076

    Group
  • The ALG must produce audit records containing information to establish where the events occurred.

    Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment,...
    Rule Medium Severity
  • SRG-NET-000077

    Group
  • The ALG must produce audit records containing information to establish the source of the events.

    Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment...
    Rule Medium Severity
  • SRG-NET-000078

    Group
  • The ALG must produce audit records containing information to establish the outcome of the events.

    Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the ne...
    Rule Medium Severity
  • SRG-NET-000079

    Group
  • The ALG must generate audit records containing information to establish the identity of any individual or process associated with the event.

    Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules