Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000510-ALG-000111

    Group
  • The Palo Alto Networks security platform, if used for TLS/SSL decryption, must use NIST FIPS-validated cryptography to implement encryption.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network element must implement cryptographic modules adhering to the higher standa...
    Rule Medium Severity
  • SRG-NET-000511-ALG-000051

    Group
  • The Palo Alto Networks security platform must, at a minimum, off-load threat and traffic log records onto a centralized log server in real time.

    Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also protects the audit record in case the system/component being audited is comp...
    Rule Low Severity
  • SRG-NET-000512-ALG-000064

    Group
  • The Palo Alto Networks security platform must inspect inbound and outbound SMTP and Extended SMTP communications traffic (if authorized) for protocol compliance and protocol anomalies.

    Application protocol anomaly detection examines application layer protocols such as SMTP to identify attacks based on observed deviations in the normal RFC behavior of a protocol or service. This t...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000065

    Group
  • The Palo Alto Networks security platform must inspect inbound and outbound FTP and FTPS communications traffic (if authorized) for protocol compliance and protocol anomalies.

    Application protocol anomaly detection examines application layer protocols such as FTP to identify attacks based on observed deviations in the normal RFC behavior of a protocol or service. This ty...
    Rule Medium Severity
  • SRG-NET-000512-ALG-000066

    Group
  • The Palo Alto Networks security platform must inspect inbound and outbound HTTP traffic (if authorized) for protocol compliance and protocol anomalies.

    Application protocol anomaly detection examines application layer protocols such as HTTP to identify attacks based on observed deviations in the normal RFC behavior of a protocol or service. This t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules