Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG limits the number of concurrent sessions to an organization-defined number for all accounts and/or account types. If the ALG does not limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types, this is a finding.
If user access control intermediary services are provided, configure the ALG to limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG is configured to inspect traffic or forward to a monitoring device for inspection prior to forwarding to inbound or outbound destinations. Verify that the communications package is either forwarded or disallowed and that the process does not alter the original data payload that is forwarded to the destination application. If the ALG does not ensure inbound and outbound traffic is monitored for compliance with remote access security policies, this is a finding.
If intermediary services for remote access communications traffic are provided, configure the ALG to either provide content inspection for inbound and outbound traffic or route the traffic to be inspected for compliance with remote access security policies.
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG is configured to control remote access methods. If the ALG does not control remote access methods, this is a finding.
If intermediary services for remote access communications traffic are provided, configure the ALG to control remote access methods.
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG uses encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions. If the ALG does not use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions, this is a finding.
If intermediary services for remote access communications traffic are provided, configure the ALG to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.
If the ALG does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS), this is not applicable. Verify the ALG is configured to implement the applicable required TLS settings in NIST PUB SP 800-52. If the ALG is not configured to implement the applicable required TLS settings in NIST PUB SP 800-52, this is a finding.
If intermediary services for TLS are provided, configure the ALG to comply with applicable required TLS settings in NIST PUB SP 800-52.
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG uses cryptography to protect the integrity of remote access sessions. If the ALG does not use cryptography to protect the integrity of remote access sessions, this is a finding.
If intermediary services for remote access communications traffic are provided, configure the ALG to use cryptography to protect the integrity of remote access sessions.
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG provides the capability to immediately disconnect or disable remote access to the information system. If the ALG does not provide the capability to immediately disconnect or disable remote access to the information system, this is a finding.
If intermediary services for remote access communications traffic are provided, configure the ALG to provide the capability to immediately disconnect or disable remote access to the information system.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the ALG does not prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents code injection attacks from being launched against application objects including, at a minimum, application URLs and application code. If the ALG does not prevent code injection attacks from being launched against application objects including, at a minimum, application URLs and application code, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent code injection attacks from being launched against application objects including, at a minimum, application URLs and application code.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the ALG does not prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the ALG does not detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects code injection attacks from being launched against application objects including, at a minimum, application URLs and application code. If the ALG does not detect code injection attacks from being launched against application objects including, at a minimum, application URLs and application code, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect code injection attacks from being launched against application objects including, at a minimum, application URLs and application code.
Verify the ALG is configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies. If the ALG is not configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies, this is a finding.
Configure the ALG to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
Verify the ALG is configured to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic. If the ALG is not configured to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic, this is a finding.
Configure the ALG to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic
Verify the ALG restricts or blocks harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic. If the ALG does not restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic, this is a finding.
Configure the ALG to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic
Verify the ALG immediately uses updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions. If the ALG does not immediately use updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions, this is a finding.
Configure the ALG to immediately use updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions.
If the ALG is not used as part of a CDS, this is not applicable. Verify the ALG applies information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software. If the ALG is not configured to apply information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software, this is a finding.
If the ALG is used as part of a CDS, configure the ALG to apply information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG displays the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network. If the ALG does not display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network, this is a finding.
If user access control intermediary services are provided, configure the ALG to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG retains the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and takes explicit actions to log on for further access. If the ALG does not retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access, this is a finding.
If user access control intermediary services are provided, configure the ALG to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG displays the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system. If the ALG does not display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system, this is a finding.
If user access control intermediary services are provided, configure the ALG to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to access privileges occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access privileges occur, this is a finding.
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful attempts to access privileges occur.
Verify the ALG generates audit records when successful/unsuccessful attempts to access security objects occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access security objects occur, this is a finding.
Configure the ALG to generate audit records when successful/unsuccessful attempts to access security objects occur.
If the ALG is not part of the CDS, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to access security levels occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access security levels occur, this is a finding.
If the ALG is part of the CDS, configure the ALG to generate audit records when successful/unsuccessful attempts to access security levels occur.
Verify the ALG generates audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur, this is a finding.
Configure the ALG to generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to modify privileges occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify privileges occur, this is a finding.
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful attempts to modify privileges occur.
Verify the ALG generates audit records when successful/unsuccessful attempts to modify security objects occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify security objects occur, this is a finding.
Configure the ALG to generate audit records when successful/unsuccessful attempts to modify security objects occur.
Verify the ALG generates audit records when successful/unsuccessful attempts to modify security levels occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify security levels occur, this is a finding.
Configure the ALG to generate audit records when successful/unsuccessful attempts to modify security levels occur.
Verify the ALG generates audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur, this is a finding.
Configure the ALG to generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to delete privileges occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete privileges occur, this is a finding.
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful attempts to delete privileges occur.
Verify the ALG generates audit records when successful/unsuccessful attempts to delete security levels occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete security levels occur, this is a finding.
Configure the ALG to generate audit records when successful/unsuccessful attempts to delete security levels occur.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful logon attempts occur. If the ALG does not generate audit records when successful/unsuccessful logon attempts occur, this is a finding.
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful logon attempts occur.
Verify the ALG produces audit records containing information to establish what type of events occurred. If the ALG does not produce audit records containing information to establish what type of events occurred, this is a finding.
Configure the ALG to produce audit records containing information to establish what type of events occurred.
Verify the ALG produces audit records containing information to establish when (date and time) the events occurred. If the ALG does not produce audit records containing information to establish when (date and time) the events occurred, this is a finding.
Configure the ALG to produce audit records containing information to establish when (date and time) the events occurred.
Verify the ALG produces audit records containing information to establish where the events occurred. If the ALG does not produce audit records containing information to establish where the events occurred, this is a finding.
Configure the ALG to produce audit records containing information to establish where the events occurred.
Verify the ALG produces audit records containing information to establish the source of the events. If the ALG does not produce audit records containing information to establish the source of the events, this is a finding.
Configure the ALG to produce audit records containing information to establish the source of the events.
Verify the ALG produces audit records containing information to establish the outcome of the events. If the ALG does not produce audit records containing information to establish the outcome of the events, this is a finding.
Configure the ALG to produce audit records containing information to establish the outcome of the events.
Verify the ALG produces audit records containing information to establish the identity of any individual or process associated with the event. If the ALG does not produce audit records containing information to establish the identity of any individual or process associated with the event, this is a finding.
Configure the ALG to produce audit records containing information to establish the identity of any individual or process associated with the event.
Verify the ALG supports centralized management and configuration. If the ALG does not support centralized management and configuration, this is a finding.
Configure the ALG to support centralized management and configuration.
Verify the ALG off-loads audit records onto a centralized log server. If the ALG does not off-load audit records onto a centralized log server, this is a finding.
Configure the ALG to off-load audit records onto a centralized log server.
Verify the ALG off-loads audit records onto a centralized log server in real time. If the ALG does not off-load onto a centralized log server in real time, this is a finding.
Configure the ALG to off-load onto a centralized log server in real time.
If the ALG is not used as part of a CDS, this is not applicable. Verify the ALG has the capability to implement journaling. If the ALG does not have the capability to implement journaling, this is a finding.
If the ALG is part of a CDS, configure the ALG to provide the capability to implement journaling.
Verify the ALG provides an immediate real-time alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server. If the ALG does not provide an immediate real-time alert to, at a minimum, the SCA and ISSO, of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server, this is a finding.
Configure the ALG to provide an immediate real-time alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.
Verify the ALG sends an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs. If the ALG does not send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs, this is a finding.
Configure the ALG to send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs.
Verify the ALG shuts down by default upon audit failure (unless availability is an overriding concern). If the ALG does not shut down by default upon audit failure (unless availability is an overriding concern), this is a finding.
Configure the ALG to shut down by default upon audit failure (unless availability is an overriding concern).
Verify the ALG protects audit information from unauthorized read access. If the ALG does not protect audit information from unauthorized read access, this is a finding.
Configure the ALG to protect audit information from unauthorized read access.
Verify the ALG protects audit information from unauthorized modification. If the ALG does not protect audit information from unauthorized modification, this is a finding.
Configure the ALG to protect audit information from unauthorized modification.
Verify the ALG protects audit information from unauthorized deletion. If the ALG does not protect audit information from unauthorized deletion, this is a finding.
Configure the ALG to protect audit information from unauthorized deletion.
Verify the ALG protects audit tools from unauthorized access. If the ALG does not protect audit tools from unauthorized access, this is a finding.
Configure the ALG to protect audit tools from unauthorized access.
Verify the ALG protects audit tools from unauthorized modification. If the ALG does not protect audit tools from unauthorized modification, this is a finding.
Configure the ALG to protect audit tools from unauthorized modification.
Verify the ALG protects audit tools from unauthorized deletion. If the ALG does not protect audit tools from unauthorized deletion, this is a finding.
Configure the ALG to protect audit tools from unauthorized deletion.
Verify the ALG is configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices. If the ALG is not configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices, this is a finding.
Configure the ALG to comply with the security configuration settings based on DoD security policy and technology-specific security best practices.
If the ALG does not provide intermediary/proxy services for SMTP communications traffic, this is not applicable. Verify the ALG inspects inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies. If the ALG does not inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies, this is a finding.
If the ALG provides intermediary/proxy services SMTP communications traffic, configure the ALG to inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.
If the ALG does not provide intermediary/proxy services FTP communications traffic, this is not applicable. Verify the ALG inspects inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies. If the ALG does not inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies, this is a finding.
If the ALG provides intermediary/proxy services for FTP communications traffic, configure the ALG to inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
If the ALG does not provide intermediary/proxy services for HTTP communications traffic, this is not applicable. Verify the ALG inspects inbound and outbound HTTP communications traffic for protocol compliance and protocol anomalies. If the ALG does not inspect inbound and outbound HTTP communications traffic for protocol compliance and protocol anomalies, this is a finding.
If the ALG provides intermediary/proxy services for HTTP communications traffic, configure the ALG to inspect inbound and outbound HTTP communications traffic for protocol compliance and protocol anomalies.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG uses source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions. If the ALG is not configured to use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions, this is a finding.
If the ALG is part of a CDS, configure the ALG to use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG allows privileged administrators to enable/disable all security policy filters used to enforce information flow control. If the ALG is not configured to allow privileged administrators to enable/disable all security policy filters used to enforce information flow control, this is a finding.
If the ALG is part of a CDS, configure the ALG to allow privileged administrators to enable/disable all security policy filters used to enforce information flow control.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG allows privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control. If the ALG does not allow privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control, this is a finding.
If the ALG is part of a CDS, configure the ALG to allow privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to use organization-defined data type identifiers to validate data essential for information flow decisions. If the ALG is not configured to use organization-defined data type identifiers to validate data essential for information flow decisions, this is a finding.
If the ALG is part of a CDS, configure the ALG to use organization-defined data type identifiers to validate data essential for information flow decisions.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG, when transferring information between different security domains, is configured to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains. If the ALG is not configured to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains, this is a finding.
If the ALG is part of a CDS, configure the ALG to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG, when transferring information between different security domains, implements organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content. If the ALG when transferring information between different security domains does not implement organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content, this is a finding.
If the ALG is part of a CDS, configure the ALG to implement organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content when transferring information between different security domains.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG when transferring information between different security domains, is configured to examine the information for the presence of organization-defined unsanctioned information. If the ALG is not configured to examine the information for the presence of organization-defined unsanctioned information when transferring information between different security domains, this is a finding.
If the ALG is part of a CDS, configure the ALG to examine the information for the presence of organization-defined unsanctioned information when transferring information between different security domains.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG prohibits the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains. If the ALG is not configured to prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains, this is a finding.
If the ALG is part of a CDS, configure the ALG to prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG uniquely identifies and authenticates source by organization, system, application, and/or individual for information transfer. If the ALG is not configured to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer, this is a finding.
If the ALG is part of a CDS, configure the ALG to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG uniquely identifies and authenticates destination by organization, system, application, and/or individual for information transfer. If the ALG is not configured to uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer, this is a finding.
If the ALG is part of a CDS, configure the ALG to uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG binds security attributes to information using organization-defined binding techniques to facilitate information flow policy enforcement. If the ALG does not bind security attributes to information using organization-defined binding techniques to facilitate information flow policy enforcement, this is a finding.
If the ALG is part of a CDS, configure the ALG to bind security attributes to information using organization-defined binding techniques to facilitate information flow policy enforcement.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to apply the same security policy filtering to metadata as it applies to data payloads when transferring information between different security domains. If the ALG is not configured to apply the same security policy filtering to metadata as it applies to data payloads when transferring information between different security domains, this is a finding.
If the ALG is part of a CDS, configure the ALG to apply the same security policy filtering to metadata as it applies to data payloads when transferring information between different security domains.
If the ALG is not part of a CDS, this is not applicable. Verify changes made to the policy filters (e.g., rules sets or content filters) take effect immediately. The change in the filter must be applied to active sessions as well as new sessions without the need for restart of recompiling. If the ALG does not enforce dynamic traffic flow control based on organization-defined policies, this is a finding.
If the ALG is part of a CDS, configure the ALG to enforce dynamic flow control based on organization-defined policies.
If the ALG is not part of a CDS, this is not applicable. Verify that policy filters exist that enforce traffic flow inbound and outbound across the controlled security boundary based on organization-defined metadata. If the ALG does not control traffic based on organization-defined metadata, this is a finding.
If the ALG is part of a CDS, configure inbound or outbound policy filters to enforce traffic flow across the controlled security boundary based on organization-defined metadata.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to block the transfer of data with malformed security attribute metadata structures. If the ALG is not configured to block the transfer of data with malformed security attribute metadata structures, this is a finding.
If the ALG is part of a CDS, configure the ALG to block the transfer of data with malformed security attribute metadata structures.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to enforce organization-defined one-way information flows using hardware mechanisms. If the ALG is not configured to enforce organization-defined one-way information flows using hardware mechanisms, this is a finding.
If the ALG is part of a CDS, configure the ALG to enforce organization-defined one-way information flows using hardware mechanisms.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows. If the ALG is not configured to enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows, this is a finding.
If the ALG is part of a CDS, configure the ALG to enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows.
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to enforce the use of human reviews for organization-defined information flows under organization-defined conditions. If the ALG is not configured to enforce the use of human reviews for organization-defined information flows under organization-defined conditions, this is a finding.
If the ALG is part of a CDS, configure the ALG to enforce the use of human reviews for organization-defined information flows under organization-defined conditions.
Review the ALG configuration to determine if services or functions not required for operation, or not related to ALG functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If unnecessary services and functions are enabled on the ALG, this is a finding.
Remove unneeded services and functions from the ALG. Removal is recommended since the service or function may be inadvertently enabled. However, if removal is not possible, disable the service or function.
Review the ALG configuration to determine if application proxies are installed which are not related to the purpose of the gateway. If the ALG has unrelated or unneeded application proxy services installed, this is a finding.
Remove application proxy services that are unrelated or unneeded to the primary function of the ALG.
View the configuration and vendor documentation of the ALG application to find the minimum ports, protocols, and services which are required for operation of the ALG. Compare enabled ports, protocols, and/or services with the Ports, Protocol, and Service Management (PPSM) and IAVM requirements. If ports, protocols, and/or services are not disabled or restricted as required by the PPSM, this is a finding.
Disable ports, protocols, and/or services not required for operation of the ALG application.
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to require users to re-authenticate when organization-defined circumstances or situations require re-authentication. If the ALG does not require users to re-authenticate when organization-defined circumstances or situations require re-authentication, this is a finding.
If user access control intermediary services are provided, configure the ALG to require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG is configured with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges. If the ALG is not configured with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges, this is a finding.
If user access control intermediary services are provided, configure the ALG with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges.
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users). If the ALG does not uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
If user access control intermediary services are provided, configure the ALG to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to use a specific authentication server(s). If the ALG does not restrict user authentication traffic to a specific authentication server(s), this is a finding.
If user authentication intermediary services are provided, configure the ALG to use a specific authentication server(s).
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG implements multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the ALG does not implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
If user authentication intermediary services are provided, configure the ALG to implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the ALG does not implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
If user authentication intermediary services are provided, configure the ALG to implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to use multifactor authentication for network access to non-privileged accounts. If the ALG does not use multifactor authentication for network access to non-privileged accounts, this is a finding.
If user authentication intermediary services are provided, configure the ALG to use multifactor authentication for network access to non-privileged accounts.
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to implement replay-resistant authentication mechanisms for network access to non-privileged accounts. If the ALG does not implement replay-resistant authentication mechanisms for network access to non-privileged accounts, this is a finding.
If user authentication intermediary services are provided, configure the ALG to implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG transmits only encrypted representations of passwords. If the ALG does not transmit only encrypted representations of passwords, this is a finding.
If user authentication intermediary services are provided, configure the ALG to transmit only encrypted representations of passwords.
Verify the ALG prohibits the use of cached authenticators after an organization-defined time period. If the ALG does not prohibit the use of cached authenticators after an organization-defined time period, this is a finding.
Configure the ALG to prohibit the use of cached authenticators after an organization-defined time period.
If the ALG does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the ALG implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If the ALG does not implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network, this is a finding.
If PKI-based user authentication intermediary services are provided, configure the ALG to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
If the ALG does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS), this is not applicable. Verify the ALG validates certificates used for TLS functions by performing RFC 5280-compliant certification path validation. If the ALG does not validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation, this is a finding.
If intermediary services for TLS are provided, configure the ALG to validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.
If the ALG does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the ALG maps the authenticated identity to the user account for PKI-based authentication. If the ALG does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.
If PKI-based user authentication intermediary services are provided, configure the ALG to map the authenticated identities to the user account.
If intermediary services are not provided to non-organizational users, this is not applicable. If the ALG does not provide user authentication intermediary services, this is not applicable. Review the ALG authentication functions. Verify identification and authentication is required for non-organizational users. Examine the policy filters to verify a rule exists to deny access to unauthenticated, non-organizational users. If the ALG does not uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users, this is a finding.
If user authentication intermediary services are provided, configure ALG to uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG conform to FICAM-issued profiles. If the ALG does not conform to FICAM-issued profiles, this is a finding.
If user authentication intermediary services are provided, configure ALG to conform to FICAM-issued profiles.
Verify the ALG terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity. If the ALG does not terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, this is a finding.
Configure ALG to terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity.
If the ALG does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC), this is not applicable. Verify the ALG implements NIST FIPS-validated cryptography to generate cryptographic hashes. If the ALG does not implement NIST FIPS-validated cryptography to generate cryptographic hashes, this is a finding
If encryption intermediary services are provided, configure the ALG to implement NIST FIPS-validated cryptography to generate cryptographic hashes.
If the ALG does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC), this is not applicable. Verify the ALG implements NIST FIPS-validated cryptography to implement for digital signatures. If the ALG does not implement NIST FIPS-validated cryptography for digital signatures, this is a finding.
If encryption intermediary services are provided, configure the ALG to implement NIST FIPS-validated cryptography for digital signatures.
If the ALG does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC), this is not applicable. Verify the ALG uses NIST FIPS-validated cryptography to implement encryption services. If the ALG does not use NIST FIPS-validated cryptography to implement encryption services, this is a finding.
If encryption intermediary services are provided, configure the ALG to use NIST FIPS-validated cryptography to implement encryption services.
Verify the ALG detects, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment. If the ALG does not detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment, this is a finding.
Configure the ALG to detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG blocks or restricts detected prohibited mobile code. If the ALG does not block or restrict detected prohibited mobile code, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to block or restrict detected prohibited mobile code.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents the download of prohibited mobile code. If the ALG does not prevent the download of prohibited mobile code, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent the download of prohibited mobile code.
Verify the ALG protects the authenticity of communications sessions. If the ALG does not protect the authenticity of communications sessions, this is a finding.
Configure ALG to protect the authenticity of communications sessions.
Verify the ALG invalidates session identifiers upon user logout or other session termination. If the ALG does not invalidate session identifiers upon user logout or other session termination, this is a finding.
Configure ALG to invalidate session identifiers upon user logout or other session termination.
Verify the ALG recognizes only system-generated session identifiers. If the ALG does not recognize only system-generated session identifiers, this is a finding.
Configure ALG to recognize only system-generated session identifiers.
Verify the ALG generates unique session identifiers using a FIPS 140-2 approved random number generator. If the ALG does not generate unique session identifiers using a FIPS 140-2 approved random number generator, this is a finding.
Configure ALG to generate unique session identifiers using a FIPS 140-2 approved random number generator.
If the ALG does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the ALG only accepts end entity certificates issued by DoD PKI or DoD-approved PKI CAs for the establishment of protected sessions. If the ALG accepts non-DoD approved PKI end entity certificates, this is a finding.
If PKI-based user authentication intermediary services are provided, configure the ALG to only accept end entity certificates issued by DoD PKI or DoD-approved PKI CAs for the establishment of protected sessions.
Verify the ALG, in the event of a system failure, saves diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted. If the ALG does not save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted, this is a finding.
Configure the ALG, in the event of a system failure, to save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
Verify the ALG implements load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks. If the device does not implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks, this is a finding.
Configure the ALG to implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG protects against or limits the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis. If the ALG does not protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG protects against or limits the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors. If the ALG does not protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG protects against or limits the effects of known types of DoS attacks by employing signatures. If the ALG does not protect against or limit the effects of known types of DoS attacks by employing signatures, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to protect against or limit the effects of known types of DoS attacks by employing signatures.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG is configured to block outbound traffic containing known and unknown DoS attacks. If the ALG does not block outbound traffic containing known and unknown DoS attacks, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to block outbound traffic containing known and unknown DoS attacks.
Verify the ALG only allows incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations. If the ALG allows incoming communications from unauthorized sources routed to unauthorized destinations, this is a finding.
Configure the ALG to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
Verify the ALG fails securely in the event of an operational failure. If the ALG does not fail securely in the event of an operational failure, this is a finding.
Configure the ALG to fail securely in the event of an operational failure.
Verify the ALG denies network communications traffic by default and allows network communications traffic by exception on both inbound and outbound interfaces. If the ALG does not deny network communications traffic by default and allow network communications traffic by exception on both inbound and outbound interfaces, this is a finding.
Configure the ALG to deny network communications traffic by default and allow network communications traffic by exception on both inbound and outbound interfaces.
Verify the ALG identifies and logs internal users associated with denied outgoing communications traffic posing a threat to external information systems. If the ALG does not identify and log internal users associated with denied outgoing communications traffic posing a threat to external information systems, this is a finding.
Configure the ALG to identify and log internal users associated with denied outgoing communications traffic posing a threat to external information systems.
Verify the ALG checks the validity of all data inputs except those specifically identified by the organization. If the ALG does not check the validity of all data inputs except those specifically identified by the organization, this is a finding.
Configure the ALG to check the validity of all data inputs except those specifically identified by the organization.
Verify the ALG behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If the ALG does not behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received, this is a finding.
Configure the ALG to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
Verify the ALG generates error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries. If the ALG does not generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries, this is a finding.
Configure the ALG to generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries.
Verify the ALG reveals error messages only to the ISSO, ISSM, and SCA. If the ALG does not reveal error messages only to the ISSO, ISSM, and SCA, this is a finding.
Configure the ALG to reveal error messages only to the ISSO, ISSM, and SCA.
If the ALG does not perform content filtering as part of its traffic management functionality, this is not applicable. Verify the ALG automatically updates malicious code protection mechanisms. If the ALG does not automatically update malicious code protection mechanisms, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to automatically update malicious code protection mechanisms.
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG updates malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures. If the ALG does not update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG performs real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed. If the ALG does not perform real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to perform real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed.
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG blocks malicious code upon detection. If the ALG does not block malicious code when detected, this is a finding.
If the ALG performs content filtering as part of its traffic management functionality, configure the ALG to block malicious code upon detection.
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG blocks and either deletes or quarantines malicious code upon detection. If the ALG does not block and either delete or quarantine malicious code upon detection, this is a finding.
If content filtering is provided as part of the traffic management functionality, configure the ALG to block and either delete or quarantine malicious code when it is detected.
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG sends an immediate (within seconds) alert to the system administrator, at a minimum, when malicious code is detected. If the ALG does not send an immediate (within seconds) alert to the system administrator, at a minimum, when malicious code is detected, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to send an immediate (within seconds) alert to the system administrator, at a minimum, when malicious code is detected.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG integrates with a system-wide intrusion detection system. If the ALG does not integrate with a system-wide intrusion detection system, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to integrate with a system-wide intrusion detection system.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum. If the ALG does not detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates a log record when unauthorized network services are detected. If the ALG does not generate a log record when unauthorized network services are detected, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate a log record when unauthorized network services are detected.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG continuously monitors inbound communications traffic for unusual or unauthorized activities or conditions. If the ALG does not continuously monitor inbound communications traffic for unusual or unauthorized activities or conditions, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to continuously monitor inbound communications traffic for unusual or unauthorized activities or conditions.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG continuously monitors outbound communications traffic for unusual or unauthorized activities or conditions. If the ALG does not continuously monitor outbound communications traffic for unusual or unauthorized activities or conditions, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to continuously monitor outbound communications traffic for unusual or unauthorized activities or conditions.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG sends an alert to, at a minimum, the ISSO and ISSM when detection events occur. If the ALG does not send an alert to, at a minimum, the ISSO and ISSM when detection events from real-time monitoring of communications traffic occur, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to send an alert to, at a minimum, the ISSO and ISSM when detection events occur.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.
If the ALG does not provide spam protection functions, this is not applicable. Verify the ALG automatically updates spam protection mechanisms. If the ALG does not automatically update spam protection mechanisms, this is a finding.
If the ALG provides spam protection functions, configure the ALG to automatically update spam protection mechanisms.
Verify the ALG generates audit records when successful/unsuccessful attempts to delete security objects occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete security objects occur, this is a finding.
Configure the ALG to generate audit records when successful/unsuccessful attempts to delete security objects occur.
Verify the ALG generates audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur, this is a finding.
Configure the ALG to generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records showing starting and ending time for user access to the system. If the ALG does not generate audit records showing starting and ending time for user access to the system, this is a finding.
If user access control intermediary services are provided, configure the ALG to generate audit records showing starting and ending time for user access to the system.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG provides the capability for authorized users to select a user session to capture or view. If the ALG does not provide the capability for authorized users to select a user session to capture or view, this is a finding.
If user access control intermediary services are provided, configure the ALG to provide the capability for authorized users to select a user session to capture or view.
If the ALG does not provide user access control and intermediary services, this is not applicable. Verify the ALG provides the capability for authorized users to capture, record, and log all content related to a user session. If the ALG does not provide the capability for authorized users to capture, record, and log all content related to a user session, this is a finding.
If user access control intermediary services are provided, configure the ALG to provide the capability for authorized users to capture, record, and log all content related to a user session.
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the ALG does not detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
Verify the ALG function fails to a secure state upon failure of initialization, shutdown, or abort actions. If the ALG function does not fail to a secure state upon failure of initialization, shutdown, or abort actions, this is a finding.
Configure the ALG to fail to a secure state upon failure of initialization, shutdown, or abort actions.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG conceals, via the session lock, information previously visible on the display with a publicly viewable image. If the ALG does not conceal, via the session lock, information previously visible on the display with a publicly viewable image, this is a finding.
If user access control intermediary services are provided, configure the ALG to conceal, via the session lock, information previously visible on the display with a publicly viewable image.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG initiates a session lock after a 15-minute period of inactivity. If the ALG does not initiate a session lock after a 15-minute period of inactivity, this is a finding.
If user access control intermediary services are provided, configure the ALG to initiate a session lock after a 15-minute period of inactivity.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG provides the capability for users to directly initiate a session lock. If the ALG does not provide the capability for users to directly initiate a session lock, this is a finding.
If user access control intermediary services are provided, configure the ALG to provide the capability for users to directly initiate a session lock.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG retains the session lock until the user reestablishes access using established identification and authentication procedures. If the ALG does not retain the session lock until the user reestablishes access using established identification and authentication procedures, this is a finding.
If user access control intermediary services are provided, configure the ALG to retain the session lock until the user reestablishes access using established identification and authentication procedures.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG automatically terminates a user session when organization-defined conditions or trigger events that require a session disconnect occur. If the ALG does not automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur, this is a finding.
If user access control intermediary services are provided, configure the ALG to automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG provides a logoff capability for user-initiated communications sessions. If the ALG does not provide a logoff capability for user-initiated communications sessions, this is a finding.
If user access control intermediary services are provided, configure the ALG to provide a logoff capability for user-initiated communications sessions.
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG displays an explicit logoff message to users indicating the reliable termination of authenticated communications sessions. If the ALG does not display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions, this is a finding.
If user access control intermediary services are provided, configure the ALG to display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.
If the ALG does not generate or store secret or private keys, this is not applicable. Verify the ALG uses a FIPS 140-2 validated cryptographic module for private key generation, storage and access. If the ALG does not use or support a FIPS 140-2 validated cryptographic module for producing, storing and accessing private key data, this is a finding.
For ALGs that store secret or private keys, configure the ALG settings to ensure it uses a FIPS 140-2 validated cryptographic module for generating, storing and accessing private keys.