Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000019-VPN-000040

    Group
  • AOS, when used as a VPN Gateway, must ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.

    Unrestricted traffic may contain malicious traffic, which poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth...
    Rule Medium Severity
  • SRG-NET-000053-VPN-000170

    Group
  • AOS, when used as a VPN Gateway, must limit the number of concurrent sessions for user accounts to one or to an organization-defined number.

    VPN gateway management includes the ability to control the number of users and user sessions that utilize a VPN gateway. Limiting the number of allowed users and sessions per user is helpful in lim...
    Rule Medium Severity
  • SRG-NET-000166-VPN-000580

    Group
  • The Remote Access VPN Gateway must use a separate authentication server (e.g., Lightweight Directory Access Protocol [LDAP], Remote Authentication Dial-In User Service [RADIUS], Terminal Access Controller Access-Control System+ [TACACS+] to perform user authentication.

    The VPN interacts directly with public networks and devices and should not contain user authentication information for all users. Authentication, Authorization, and Accounting (AAA) network securit...
    Rule Medium Severity
  • SRG-NET-000138-VPN-000490

    Group
  • The VPN Gateway must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...
    Rule Medium Severity
  • SRG-NET-000213-VPN-000721

    Group
  • The Remote Access VPN Gateway must terminate remote access network connections after an organization-defined time period.

    This requirement is in response to the DOD Office of Inspector General Audit of Maintaining Cybersecurity in the Coronavirus Disease-2019 Telework Environment. Best practice is to terminate inacti...
    Rule Medium Severity
  • SRG-NET-000337-VPN-001300

    Group
  • AOS, when used as a VPN Gateway, must renegotiate the security association after 24 hours or less or as defined by the organization.

    When a VPN gateway creates an IPsec security association (SA), resources must be allocated to maintain the SA. These resources are wasted during periods of IPsec endpoint inactivity, which could re...
    Rule Medium Severity
  • SRG-NET-000132-VPN-000470

    Group
  • The Remote Access VPN Gateway must be configured to prohibit Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Forwarding (L2F).

    PPTP and L2F are obsolete methods for implementing virtual private networks. Both protocols may be easy to use and readily available, but they have many well-known security issues and exploits. Enc...
    Rule Medium Severity
  • SRG-NET-000205-VPN-000710

    Group
  • AOS, when used as a VPN Gateway, must be configured to route sessions to an intrusion detection and prevention system (IDPS) for inspection.

    Remote access devices, such as those providing remote access to network devices and information systems, that lack automated capabilities increase risk and make remote user access management diffic...
    Rule Medium Severity
  • SRG-NET-000369-VPN-001620

    Group
  • AOS, when used as a VPN Gateway, must disable split-tunneling for remote client VPNs.

    Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to exfiltration of organizational information. A VPN hardware or software c...
    Rule Medium Severity
  • SRG-NET-000512-VPN-002220

    Group
  • AOS, when used as an IPsec VPN Gateway, must use Internet Key Exchange (IKE) for IPsec VPN security associations (SAs).

    Without IKE, the SPI is manually specified for each security association. IKE peers will negotiate the encryption algorithm and authentication or hashing methods as well as generate the encryption ...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules