III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
The NSX Distributed Firewall must deny network communications traffic by default and allow network communications traffic by exception.
To prevent malicious or accidental leakage of traffic, organizations must implement a deny-by-default security posture at the network perimeter. Such rulesets prevent many malicious exploits or acc...Rule Medium Severity -
SRG-NET-000364-FW-000040
Group -
The NSX Distributed Firewall must be configured to inspect traffic at the application layer.
Application inspection enables the firewall to control traffic based on different parameters that exist within the packets such as enforcing application-specific message and field length. Inspectio...Rule Medium Severity -
SRG-NET-000364-FW-000042
Group -
The NSX Distributed Firewall must configure SpoofGuard to restrict it from accepting outbound packets that contain an illegitimate address in the source address.
A compromised host in an enclave can be used by a malicious platform to launch cyberattacks on third parties. This is a common practice in "botnets", which are a collection of compromised computers...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules