A10 Networks ADC ALG Security Technical Implementation Guide

Description

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]

Details

Version / Release: V2R1

Published: 2021-03-25

Updated At: 2021-05-02 20:51:21

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter

Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-237032r639543_rule AADC-AG-000018 CCI-000068 MEDIUM The A10 Networks ADC, when used for TLS encryption and decryption, must be configured to comply with the required TLS settings in NIST SP 800-52. SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks which explo
    SV-237033r639546_rule AADC-AG-000023 CCI-000133 LOW The A10 Networks ADC, when used to load balance web applications, must enable external logging for accessing Web Application Firewall data event messages. Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. External logging must be enabled for WAF data event messages. Create a server configuration for each log s
    SV-237034r639549_rule AADC-AG-000026 CCI-000139 LOW The A10 Networks ADC must send an alert to, at a minimum, the ISSO and SCA when connectivity to the Syslog servers is lost. It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an impending failure of the audit capability and system opera
    SV-237035r639552_rule AADC-AG-000034 CCI-000381 MEDIUM The A10 Networks ADC must not have unnecessary scripts installed. Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of these functions and services are installed and enabled by default. The organization must determine which functions and services are
    SV-237036r639555_rule AADC-AG-000035 CCI-000381 MEDIUM The A10 Networks ADC must use DNS Proxy mode when Global Server Load Balancing is used. Unrelated or unneeded proxy services increase the attack vector and add excessive complexity to the securing of the device. Multiple application proxies can be installed on many devices. However, proxy types must be limited to related functions. The A10
    SV-237037r639558_rule AADC-AG-000036 CCI-000382 MEDIUM The A10 Networks ADC must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments. In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable or restrict unused or unnecessary physical and logical po
    SV-237038r639561_rule AADC-AG-000042 CCI-000185 MEDIUM The A10 Networks ADC when used for TLS encryption and decryption must validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation. A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make an informed decision regarding acceptance of an end entit
    SV-237039r639564_rule AADC-AG-000047 CCI-001109 MEDIUM The A10 Networks ADC must not have any unnecessary or unapproved virtual servers configured. A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential and approved are allowed. A virtual server is an instance where the device accepts traffic from outside hosts and redirects traf
    SV-237040r639567_rule AADC-AG-000062 CCI-001312 MEDIUM The A10 Networks ADC, when used to load balance web applications, must strip HTTP response headers. Providing too much information in error messages risks compromising the data and security of the application and system. HTTP response headers can disclose vulnerabilities about a web server. This information can be used by an attacker. The A10 Networks A
    SV-237041r639570_rule AADC-AG-000063 CCI-001312 MEDIUM The A10 Networks ADC, when used to load balance web applications, must replace response codes. Providing too much information in error messages risks compromising the data and security of the application and system. HTTP response codes can be used by an attacker to learn how a web server responds to particular inputs. Certain codes reveal that a se
    SV-237042r639573_rule AADC-AG-000074 CCI-002346 MEDIUM To protect against data mining, the A10 Networks ADC must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unauthorized data mining may result in the compromise of inform
    SV-237043r639576_rule AADC-AG-000075 CCI-002346 MEDIUM To protect against data mining, the A10 Networks ADC must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code. Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unauthorized data mining may result in the compromise of inform
    SV-237044r639579_rule AADC-AG-000076 CCI-002346 MEDIUM To protect against data mining, the A10 Networks ADC providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unauthorized data mining may result in the compromise of inform
    SV-237045r639582_rule AADC-AG-000077 CCI-002347 MEDIUM To protect against data mining, the A10 Networks ADC providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational databases may result in the compromise of information. Injection attacks allow a
    SV-237046r639585_rule AADC-AG-000078 CCI-002347 MEDIUM To protect against data mining, the A10 Networks ADC providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational databases may result in the compromise of information. SQL injection attacks are
    SV-237047r639588_rule AADC-AG-000079 CCI-002347 MEDIUM To protect against data mining, the A10 Networks ADC providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code. Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational applications may result in the compromise of information. Injection attacks allo
    SV-237048r639591_rule AADC-AG-000098 CCI-002470 MEDIUM The A10 Networks ADC being used for TLS encryption and decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions. Non-DoD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DoD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security co
    SV-237049r639594_rule AADC-AG-000099 CCI-002385 HIGH The A10 Networks ADC must protect against TCP and UDP Denial of Service (DoS) attacks by employing Source-IP based connection-rate limiting. If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation of content filtering gateways and application layer firewalls at key boundaries in the architecture mitigates the risk of DoS atta
    SV-237050r639597_rule AADC-AG-000100 CCI-002385 MEDIUM The A10 Networks ADC must implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks. Although maintaining high availability is normally an operational consideration, load balancing is also a useful strategy in mitigating network-based DoS attacks. If the network does not provide safeguards against DoS attacks, network resources will be un
    SV-237051r639600_rule AADC-AG-000101 CCI-002385 MEDIUM The A10 Networks ADC must enable DDoS filters. If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation of content filtering gateways and application layer firewalls at key boundaries in the architecture mitigates the risk of DoS atta
    SV-237052r639603_rule AADC-AG-000103 CCI-002403 MEDIUM The A10 Networks ADC, when used to load balance web applications, must examine incoming user requests against the URI White Lists. Unrestricted traffic may contain malicious traffic, which poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth and other resources. Access control policies and access
    SV-237053r639606_rule AADC-AG-000107 CCI-002656 LOW The A10 Networks ADC, when used to load balance web applications, must enable external logging for WAF data event messages. Without coordinated reporting between separate devices, it is not possible to identify the true scale and possible target of an attack. External logging must be enabled for WAF data event messages. External logging is activated once the WAF template that
    SV-237054r639609_rule AADC-AG-000113 CCI-002664 MEDIUM The A10 Networks ADC must enable logging for packet anomaly events. Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay may result in the loss or compromise of information. Since these incidents require immediate action, these messages are assigned
    SV-237055r639612_rule AADC-AG-000114 CCI-002664 MEDIUM The A10 Networks ADC must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected. Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay may result in the loss or compromise of information. The device generates an alert which notifies designated personnel of the In
    SV-237056r639615_rule AADC-AG-000117 CCI-002664 MEDIUM The A10 Networks ADC must enable logging of Denial of Service (DoS) attacks. Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this delay may result in the loss or compromise of information. CJCSM 6510.01B, "Cyber Incident Handling Program", lists nine Cyber Inciden
    SV-237057r639618_rule AADC-AG-000122 CCI-001310 MEDIUM The A10 Networks ADC, when used for load-balancing web servers, must not allow the HTTP TRACE and OPTIONS methods. HTTP offers a number of methods that can be used to perform actions on the web server. Some of these HTTP methods can be used for nefarious purposes if the web server is misconfigured. The two HTTP methods used for normal requests are GET and POST, so inc
    SV-237058r639621_rule AADC-AG-000123 CCI-001314 MEDIUM The A10 Networks ADC must reveal error messages only to authorized individuals (ISSO, ISSM, and SA). Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can give configuration details about the network element. Limiting access to system logs and admin
    SV-237059r639624_rule AADC-AG-000140 CCI-001851 LOW The A10 Networks ADC must, at a minimum, off-load audit log records onto a centralized log server. Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also protects the audit record in case the system/component being audited is compromised. Off-loading is a common process in information s
    SV-237060r639627_rule AADC-AG-000143 CCI-000366 MEDIUM The A10 Networks ADC, when used for load balancing web servers, must deploy the WAF in active mode. The Web Application Firewall (WAF) supports three operational modes - Learning, Passive, and Active. Active is the standard operational mode and must be used in order to drop or sanitize traffic. Learning mode is used in lab environments to initially set
    SV-237061r639630_rule AADC-AG-000154 CCI-000366 MEDIUM If the Data Owner requires it, the A10 Networks ADC must be configured to perform CCN Mask, SSN Mask, and PCRE Mask Request checks. If outbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output from application and traffic monitoring serves as input to continuous monitoring and incident response programs. The A10 Networks
    SV-237062r639633_rule AADC-AG-000155 CCI-002385 HIGH The A10 Networks ADC must protect against ICMP-based Denial of Service (DoS) attacks by employing ICMP Rate Limiting. If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation of content filtering gateways and application layer firewalls at key boundaries in the architecture mitigates the risk of DoS atta
    SV-237063r639636_rule AADC-AG-000156 CCI-000366 MEDIUM The A10 Networks ADC must protect against TCP SYN floods by using TCP SYN Cookies. A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target in an attempt to consume resources, making the device unresponsive to legitimate traffic. TCP SYN Cookies are commonly implemented by the
    SV-237064r639639_rule AADC-AG-000157 CCI-000366 HIGH The A10 Networks ADC must be a FIPS-compliant version. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network element must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides