Application Layer Gateway (ALG) Security Requirements Guide (SRG)
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-NET-000053-ALG-000001
- Vuln IDs
-
- V-54337
- Rule IDs
-
- SV-68583r1_rule
Checks: C-54953r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG limits the number of concurrent sessions to an organization-defined number for all accounts and/or account types. If the ALG does not limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types, this is a finding.
Fix: F-59191r1_fix
If user access control intermediary services are provided, configure the ALG to limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-NET-000061-ALG-000009
- Vuln IDs
-
- V-54353
- Rule IDs
-
- SV-68599r1_rule
Checks: C-54969r1_chk
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG is configured to inspect traffic or forward to a monitoring device for inspection prior to forwarding to inbound or outbound destinations. Verify that the communications package is either forwarded or disallowed and that the process does not alter the original data payload that is forwarded to the destination application. If the ALG does not ensure inbound and outbound traffic is monitored for compliance with remote access security policies, this is a finding.
Fix: F-59207r1_fix
If intermediary services for remote access communications traffic are provided, configure the ALG to either provide content inspection for inbound and outbound traffic or route the traffic to be inspected for compliance with remote access security policies.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-NET-000313-ALG-000010
- Vuln IDs
-
- V-54355
- Rule IDs
-
- SV-68601r1_rule
Checks: C-54971r1_chk
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG is configured to control remote access methods. If the ALG does not control remote access methods, this is a finding.
Fix: F-59209r1_fix
If intermediary services for remote access communications traffic are provided, configure the ALG to control remote access methods.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-NET-000062-ALG-000011
- Vuln IDs
-
- V-54357
- Rule IDs
-
- SV-68603r1_rule
Checks: C-54973r1_chk
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG uses encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions. If the ALG does not use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions, this is a finding.
Fix: F-59211r1_fix
If intermediary services for remote access communications traffic are provided, configure the ALG to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-NET-000062-ALG-000150
- Vuln IDs
-
- V-54359
- Rule IDs
-
- SV-68605r1_rule
Checks: C-54975r1_chk
If the ALG does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS), this is not applicable. Verify the ALG is configured to implement the applicable required TLS settings in NIST PUB SP 800-52. If the ALG is not configured to implement the applicable required TLS settings in NIST PUB SP 800-52, this is a finding.
Fix: F-59213r1_fix
If intermediary services for TLS are provided, configure the ALG to comply with applicable required TLS settings in NIST PUB SP 800-52.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-NET-000063-ALG-000012
- Vuln IDs
-
- V-54361
- Rule IDs
-
- SV-68607r1_rule
Checks: C-54977r1_chk
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG uses cryptography to protect the integrity of remote access sessions. If the ALG does not use cryptography to protect the integrity of remote access sessions, this is a finding.
Fix: F-59215r1_fix
If intermediary services for remote access communications traffic are provided, configure the ALG to use cryptography to protect the integrity of remote access sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-NET-000314-ALG-000013
- Vuln IDs
-
- V-54363
- Rule IDs
-
- SV-68609r1_rule
Checks: C-54979r1_chk
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG provides the capability to immediately disconnect or disable remote access to the information system. If the ALG does not provide the capability to immediately disconnect or disable remote access to the information system, this is a finding.
Fix: F-59217r1_fix
If intermediary services for remote access communications traffic are provided, configure the ALG to provide the capability to immediately disconnect or disable remote access to the information system.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-ALG-000014
- Vuln IDs
-
- V-54365
- Rule IDs
-
- SV-68611r1_rule
Checks: C-54981r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the ALG does not prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
Fix: F-59219r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-ALG-000151
- Vuln IDs
-
- V-54367
- Rule IDs
-
- SV-68613r1_rule
Checks: C-54983r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents code injection attacks from being launched against application objects including, at a minimum, application URLs and application code. If the ALG does not prevent code injection attacks from being launched against application objects including, at a minimum, application URLs and application code, this is a finding.
Fix: F-59221r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent code injection attacks from being launched against application objects including, at a minimum, application URLs and application code.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-ALG-000152
- Vuln IDs
-
- V-54369
- Rule IDs
-
- SV-68615r1_rule
Checks: C-54985r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the ALG does not prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
Fix: F-59223r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-ALG-000015
- Vuln IDs
-
- V-54371
- Rule IDs
-
- SV-68617r1_rule
Checks: C-54987r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the ALG does not detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
Fix: F-59225r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-ALG-000153
- Vuln IDs
-
- V-54373
- Rule IDs
-
- SV-68619r1_rule
Checks: C-54989r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects code injection attacks from being launched against application objects including, at a minimum, application URLs and application code. If the ALG does not detect code injection attacks from being launched against application objects including, at a minimum, application URLs and application code, this is a finding.
Fix: F-59227r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect code injection attacks from being launched against application objects including, at a minimum, application URLs and application code.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-NET-000015-ALG-000016
- Vuln IDs
-
- V-54375
- Rule IDs
-
- SV-68621r1_rule
Checks: C-54991r1_chk
Verify the ALG is configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies. If the ALG is not configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies, this is a finding.
Fix: F-59229r1_fix
Configure the ALG to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-ALG-000017
- Vuln IDs
-
- V-54377
- Rule IDs
-
- SV-68623r1_rule
Checks: C-54993r1_chk
Verify the ALG is configured to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic. If the ALG is not configured to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic, this is a finding.
Fix: F-59231r1_fix
Configure the ALG to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-ALG-000018
- Vuln IDs
-
- V-54379
- Rule IDs
-
- SV-68625r1_rule
Checks: C-54995r1_chk
Verify the ALG restricts or blocks harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic. If the ALG does not restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic, this is a finding.
Fix: F-59233r1_fix
Configure the ALG to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-ALG-000019
- Vuln IDs
-
- V-54385
- Rule IDs
-
- SV-68631r1_rule
Checks: C-55001r1_chk
Verify the ALG immediately uses updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions. If the ALG does not immediately use updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions, this is a finding.
Fix: F-59239r1_fix
Configure the ALG to immediately use updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-ALG-000021
- Vuln IDs
-
- V-54387
- Rule IDs
-
- SV-68633r1_rule
Checks: C-55003r1_chk
If the ALG is not used as part of a CDS, this is not applicable. Verify the ALG applies information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software. If the ALG is not configured to apply information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software, this is a finding.
Fix: F-59241r1_fix
If the ALG is used as part of a CDS, configure the ALG to apply information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-NET-000041-ALG-000022
- Vuln IDs
-
- V-54389
- Rule IDs
-
- SV-68635r1_rule
Checks: C-55005r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG displays the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network. If the ALG does not display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network, this is a finding.
Fix: F-59243r1_fix
If user access control intermediary services are provided, configure the ALG to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-NET-000042-ALG-000023
- Vuln IDs
-
- V-54391
- Rule IDs
-
- SV-68637r1_rule
Checks: C-55007r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG retains the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and takes explicit actions to log on for further access. If the ALG does not retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access, this is a finding.
Fix: F-59245r1_fix
If user access control intermediary services are provided, configure the ALG to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- SRG-NET-000043-ALG-000024
- Vuln IDs
-
- V-54393
- Rule IDs
-
- SV-68639r1_rule
Checks: C-55009r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG displays the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system. If the ALG does not display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system, this is a finding.
Fix: F-59247r1_fix
If user access control intermediary services are provided, configure the ALG to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000513-ALG-000026
- Vuln IDs
-
- V-54395
- Rule IDs
-
- SV-68641r1_rule
Checks: C-55011r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to access privileges occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access privileges occur, this is a finding.
Fix: F-59249r1_fix
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful attempts to access privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000492-ALG-000027
- Vuln IDs
-
- V-54397
- Rule IDs
-
- SV-68643r1_rule
Checks: C-55013r1_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to access security objects occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access security objects occur, this is a finding.
Fix: F-59251r1_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to access security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000493-ALG-000028
- Vuln IDs
-
- V-54399
- Rule IDs
-
- SV-68645r1_rule
Checks: C-55015r1_chk
If the ALG is not part of the CDS, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to access security levels occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access security levels occur, this is a finding.
Fix: F-59253r1_fix
If the ALG is part of the CDS, configure the ALG to generate audit records when successful/unsuccessful attempts to access security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000494-ALG-000029
- Vuln IDs
-
- V-54401
- Rule IDs
-
- SV-68647r1_rule
Checks: C-55017r1_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur, this is a finding.
Fix: F-59255r1_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000495-ALG-000030
- Vuln IDs
-
- V-54403
- Rule IDs
-
- SV-68649r1_rule
Checks: C-55019r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to modify privileges occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify privileges occur, this is a finding.
Fix: F-59257r1_fix
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful attempts to modify privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000496-ALG-000031
- Vuln IDs
-
- V-54405
- Rule IDs
-
- SV-68651r1_rule
Checks: C-55021r1_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to modify security objects occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify security objects occur, this is a finding.
Fix: F-59259r1_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to modify security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000497-ALG-000032
- Vuln IDs
-
- V-54407
- Rule IDs
-
- SV-68653r1_rule
Checks: C-55023r1_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to modify security levels occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify security levels occur, this is a finding.
Fix: F-59261r1_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to modify security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000498-ALG-000033
- Vuln IDs
-
- V-54409
- Rule IDs
-
- SV-68655r1_rule
Checks: C-55025r1_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur, this is a finding.
Fix: F-59263r1_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000499-ALG-000034
- Vuln IDs
-
- V-54411
- Rule IDs
-
- SV-68657r1_rule
Checks: C-55027r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to delete privileges occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete privileges occur, this is a finding.
Fix: F-59265r1_fix
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful attempts to delete privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000500-ALG-000035
- Vuln IDs
-
- V-54413
- Rule IDs
-
- SV-68659r1_rule
Checks: C-55029r1_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to delete security levels occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete security levels occur, this is a finding.
Fix: F-59267r1_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to delete security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000503-ALG-000038
- Vuln IDs
-
- V-54415
- Rule IDs
-
- SV-68661r1_rule
Checks: C-55381r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful logon attempts occur. If the ALG does not generate audit records when successful/unsuccessful logon attempts occur, this is a finding.
Fix: F-59617r1_fix
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-NET-000074-ALG-000043
- Vuln IDs
-
- V-54417
- Rule IDs
-
- SV-68663r1_rule
Checks: C-55033r1_chk
Verify the ALG produces audit records containing information to establish what type of events occurred. If the ALG does not produce audit records containing information to establish what type of events occurred, this is a finding.
Fix: F-59271r1_fix
Configure the ALG to produce audit records containing information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-NET-000075-ALG-000044
- Vuln IDs
-
- V-54419
- Rule IDs
-
- SV-68665r1_rule
Checks: C-55035r1_chk
Verify the ALG produces audit records containing information to establish when (date and time) the events occurred. If the ALG does not produce audit records containing information to establish when (date and time) the events occurred, this is a finding.
Fix: F-59273r1_fix
Configure the ALG to produce audit records containing information to establish when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-ALG-000045
- Vuln IDs
-
- V-54421
- Rule IDs
-
- SV-68667r1_rule
Checks: C-55037r1_chk
Verify the ALG produces audit records containing information to establish where the events occurred. If the ALG does not produce audit records containing information to establish where the events occurred, this is a finding.
Fix: F-59275r1_fix
Configure the ALG to produce audit records containing information to establish where the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-NET-000077-ALG-000046
- Vuln IDs
-
- V-54423
- Rule IDs
-
- SV-68669r1_rule
Checks: C-55039r1_chk
Verify the ALG produces audit records containing information to establish the source of the events. If the ALG does not produce audit records containing information to establish the source of the events, this is a finding.
Fix: F-59277r1_fix
Configure the ALG to produce audit records containing information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000078-ALG-000047
- Vuln IDs
-
- V-54425
- Rule IDs
-
- SV-68671r1_rule
Checks: C-55041r1_chk
Verify the ALG produces audit records containing information to establish the outcome of the events. If the ALG does not produce audit records containing information to establish the outcome of the events, this is a finding.
Fix: F-59279r1_fix
Configure the ALG to produce audit records containing information to establish the outcome of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-NET-000079-ALG-000048
- Vuln IDs
-
- V-54427
- Rule IDs
-
- SV-68673r1_rule
Checks: C-55043r1_chk
Verify the ALG produces audit records containing information to establish the identity of any individual or process associated with the event. If the ALG does not produce audit records containing information to establish the identity of any individual or process associated with the event, this is a finding.
Fix: F-59281r1_fix
Configure the ALG to produce audit records containing information to establish the identity of any individual or process associated with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-NET-000333-ALG-000049
- Vuln IDs
-
- V-54429
- Rule IDs
-
- SV-68675r1_rule
Checks: C-55045r1_chk
Verify the ALG supports centralized management and configuration. If the ALG does not support centralized management and configuration, this is a finding.
Fix: F-59283r1_fix
Configure the ALG to support centralized management and configuration.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000334-ALG-000050
- Vuln IDs
-
- V-54431
- Rule IDs
-
- SV-68677r1_rule
Checks: C-55047r2_chk
Verify the ALG off-loads audit records onto a centralized log server. If the ALG does not off-load audit records onto a centralized log server, this is a finding.
Fix: F-59285r2_fix
Configure the ALG to off-load audit records onto a centralized log server.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000511-ALG-000051
- Vuln IDs
-
- V-54433
- Rule IDs
-
- SV-68679r1_rule
Checks: C-55049r2_chk
Verify the ALG off-loads audit records onto a centralized log server in real time. If the ALG does not off-load onto a centralized log server in real time, this is a finding.
Fix: F-59287r2_fix
Configure the ALG to off-load onto a centralized log server in real time.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000511-ALG-000052
- Vuln IDs
-
- V-54435
- Rule IDs
-
- SV-68681r1_rule
Checks: C-55051r1_chk
If the ALG is not used as part of a CDS, this is not applicable. Verify the ALG has the capability to implement journaling. If the ALG does not have the capability to implement journaling, this is a finding.
Fix: F-59289r1_fix
If the ALG is part of a CDS, configure the ALG to provide the capability to implement journaling.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-NET-000335-ALG-000053
- Vuln IDs
-
- V-54437
- Rule IDs
-
- SV-68683r1_rule
Checks: C-55053r2_chk
Verify the ALG provides an immediate real-time alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server. If the ALG does not provide an immediate real-time alert to, at a minimum, the SCA and ISSO, of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server, this is a finding.
Fix: F-59291r2_fix
Configure the ALG to provide an immediate real-time alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-NET-000088-ALG-000054
- Vuln IDs
-
- V-54439
- Rule IDs
-
- SV-68685r1_rule
Checks: C-55055r1_chk
Verify the ALG sends an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs. If the ALG does not send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs, this is a finding.
Fix: F-59293r1_fix
Configure the ALG to send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-NET-000089-ALG-000055
- Vuln IDs
-
- V-54441
- Rule IDs
-
- SV-68687r1_rule
Checks: C-55057r1_chk
Verify the ALG shuts down by default upon audit failure (unless availability is an overriding concern). If the ALG does not shut down by default upon audit failure (unless availability is an overriding concern), this is a finding.
Fix: F-59295r1_fix
Configure the ALG to shut down by default upon audit failure (unless availability is an overriding concern).
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-NET-000098-ALG-000056
- Vuln IDs
-
- V-54443
- Rule IDs
-
- SV-68689r1_rule
Checks: C-55059r1_chk
Verify the ALG protects audit information from unauthorized read access. If the ALG does not protect audit information from unauthorized read access, this is a finding.
Fix: F-59297r1_fix
Configure the ALG to protect audit information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-NET-000099-ALG-000057
- Vuln IDs
-
- V-54445
- Rule IDs
-
- SV-68691r1_rule
Checks: C-55061r1_chk
Verify the ALG protects audit information from unauthorized modification. If the ALG does not protect audit information from unauthorized modification, this is a finding.
Fix: F-59299r1_fix
Configure the ALG to protect audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-NET-000100-ALG-000058
- Vuln IDs
-
- V-54447
- Rule IDs
-
- SV-68693r1_rule
Checks: C-55063r1_chk
Verify the ALG protects audit information from unauthorized deletion. If the ALG does not protect audit information from unauthorized deletion, this is a finding.
Fix: F-59301r1_fix
Configure the ALG to protect audit information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-NET-000101-ALG-000059
- Vuln IDs
-
- V-54449
- Rule IDs
-
- SV-68695r1_rule
Checks: C-55065r1_chk
Verify the ALG protects audit tools from unauthorized access. If the ALG does not protect audit tools from unauthorized access, this is a finding.
Fix: F-59303r1_fix
Configure the ALG to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-NET-000102-ALG-000060
- Vuln IDs
-
- V-54451
- Rule IDs
-
- SV-68697r1_rule
Checks: C-55067r1_chk
Verify the ALG protects audit tools from unauthorized modification. If the ALG does not protect audit tools from unauthorized modification, this is a finding.
Fix: F-59305r1_fix
Configure the ALG to protect audit tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-NET-000103-ALG-000061
- Vuln IDs
-
- V-54453
- Rule IDs
-
- SV-68699r1_rule
Checks: C-55069r1_chk
Verify the ALG protects audit tools from unauthorized deletion. If the ALG does not protect audit tools from unauthorized deletion, this is a finding.
Fix: F-59307r1_fix
Configure the ALG to protect audit tools from unauthorized deletion.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-ALG-000062
- Vuln IDs
-
- V-54455
- Rule IDs
-
- SV-68701r1_rule
Checks: C-55071r1_chk
Verify the ALG is configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices. If the ALG is not configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices, this is a finding.
Fix: F-59309r1_fix
Configure the ALG to comply with the security configuration settings based on DoD security policy and technology-specific security best practices.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-ALG-000064
- Vuln IDs
-
- V-54457
- Rule IDs
-
- SV-68703r1_rule
Checks: C-55073r1_chk
If the ALG does not provide intermediary/proxy services for SMTP communications traffic, this is not applicable. Verify the ALG inspects inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies. If the ALG does not inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies, this is a finding.
Fix: F-59311r1_fix
If the ALG provides intermediary/proxy services SMTP communications traffic, configure the ALG to inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-ALG-000065
- Vuln IDs
-
- V-54459
- Rule IDs
-
- SV-68705r1_rule
Checks: C-55075r2_chk
If the ALG does not provide intermediary/proxy services FTP communications traffic, this is not applicable. Verify the ALG inspects inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies. If the ALG does not inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies, this is a finding.
Fix: F-59313r2_fix
If the ALG provides intermediary/proxy services for FTP communications traffic, configure the ALG to inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-ALG-000066
- Vuln IDs
-
- V-54461
- Rule IDs
-
- SV-68707r1_rule
Checks: C-55077r2_chk
If the ALG does not provide intermediary/proxy services for HTTP communications traffic, this is not applicable. Verify the ALG inspects inbound and outbound HTTP communications traffic for protocol compliance and protocol anomalies. If the ALG does not inspect inbound and outbound HTTP communications traffic for protocol compliance and protocol anomalies, this is a finding.
Fix: F-59315r2_fix
If the ALG provides intermediary/proxy services for HTTP communications traffic, configure the ALG to inspect inbound and outbound HTTP communications traffic for protocol compliance and protocol anomalies.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000323-ALG-000067
- Vuln IDs
-
- V-54463
- Rule IDs
-
- SV-68709r1_rule
Checks: C-55079r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG uses source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions. If the ALG is not configured to use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions, this is a finding.
Fix: F-59317r1_fix
If the ALG is part of a CDS, configure the ALG to use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000034
- Version
- SRG-NET-000021-ALG-000068
- Vuln IDs
-
- V-54465
- Rule IDs
-
- SV-68711r1_rule
Checks: C-55081r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG allows privileged administrators to enable/disable all security policy filters used to enforce information flow control. If the ALG is not configured to allow privileged administrators to enable/disable all security policy filters used to enforce information flow control, this is a finding.
Fix: F-59319r1_fix
If the ALG is part of a CDS, configure the ALG to allow privileged administrators to enable/disable all security policy filters used to enforce information flow control.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000035
- Version
- SRG-NET-000022-ALG-000069
- Vuln IDs
-
- V-54467
- Rule IDs
-
- SV-68713r1_rule
Checks: C-55083r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG allows privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control. If the ALG does not allow privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control, this is a finding.
Fix: F-59321r1_fix
If the ALG is part of a CDS, configure the ALG to allow privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000324-ALG-000070
- Vuln IDs
-
- V-54469
- Rule IDs
-
- SV-68715r1_rule
Checks: C-55085r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to use organization-defined data type identifiers to validate data essential for information flow decisions. If the ALG is not configured to use organization-defined data type identifiers to validate data essential for information flow decisions, this is a finding.
Fix: F-59323r1_fix
If the ALG is part of a CDS, configure the ALG to use organization-defined data type identifiers to validate data essential for information flow decisions.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000219
- Version
- SRG-NET-000282-ALG-000071
- Vuln IDs
-
- V-54471
- Rule IDs
-
- SV-68717r1_rule
Checks: C-55087r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG, when transferring information between different security domains, is configured to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains. If the ALG is not configured to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains, this is a finding.
Fix: F-59325r1_fix
If the ALG is part of a CDS, configure the ALG to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000283-ALG-000072
- Vuln IDs
-
- V-54473
- Rule IDs
-
- SV-68719r1_rule
Checks: C-55089r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG, when transferring information between different security domains, implements organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content. If the ALG when transferring information between different security domains does not implement organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content, this is a finding.
Fix: F-59327r1_fix
If the ALG is part of a CDS, configure the ALG to implement organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content when transferring information between different security domains.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000284-ALG-000073
- Vuln IDs
-
- V-54475
- Rule IDs
-
- SV-68721r1_rule
Checks: C-55091r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG when transferring information between different security domains, is configured to examine the information for the presence of organization-defined unsanctioned information. If the ALG is not configured to examine the information for the presence of organization-defined unsanctioned information when transferring information between different security domains, this is a finding.
Fix: F-59329r1_fix
If the ALG is part of a CDS, configure the ALG to examine the information for the presence of organization-defined unsanctioned information when transferring information between different security domains.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000285-ALG-000074
- Vuln IDs
-
- V-54477
- Rule IDs
-
- SV-68723r1_rule
Checks: C-55093r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG prohibits the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains. If the ALG is not configured to prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains, this is a finding.
Fix: F-59331r1_fix
If the ALG is part of a CDS, configure the ALG to prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000325-ALG-000075
- Vuln IDs
-
- V-54479
- Rule IDs
-
- SV-68725r1_rule
Checks: C-55095r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG uniquely identifies and authenticates source by organization, system, application, and/or individual for information transfer. If the ALG is not configured to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer, this is a finding.
Fix: F-59333r1_fix
If the ALG is part of a CDS, configure the ALG to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000326-ALG-000076
- Vuln IDs
-
- V-54481
- Rule IDs
-
- SV-68727r1_rule
Checks: C-55097r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG uniquely identifies and authenticates destination by organization, system, application, and/or individual for information transfer. If the ALG is not configured to uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer, this is a finding.
Fix: F-59335r1_fix
If the ALG is part of a CDS, configure the ALG to uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000327-ALG-000077
- Vuln IDs
-
- V-54483
- Rule IDs
-
- SV-68729r1_rule
Checks: C-55099r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG binds security attributes to information using organization-defined binding techniques to facilitate information flow policy enforcement. If the ALG does not bind security attributes to information using organization-defined binding techniques to facilitate information flow policy enforcement, this is a finding.
Fix: F-59337r1_fix
If the ALG is part of a CDS, configure the ALG to bind security attributes to information using organization-defined binding techniques to facilitate information flow policy enforcement.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000328-ALG-000078
- Vuln IDs
-
- V-54485
- Rule IDs
-
- SV-68731r1_rule
Checks: C-55101r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to apply the same security policy filtering to metadata as it applies to data payloads when transferring information between different security domains. If the ALG is not configured to apply the same security policy filtering to metadata as it applies to data payloads when transferring information between different security domains, this is a finding.
Fix: F-59339r1_fix
If the ALG is part of a CDS, configure the ALG to apply the same security policy filtering to metadata as it applies to data payloads when transferring information between different security domains.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000027
- Version
- SRG-NET-000029-ALG-000079
- Vuln IDs
-
- V-54487
- Rule IDs
-
- SV-68733r1_rule
Checks: C-55103r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify changes made to the policy filters (e.g., rules sets or content filters) take effect immediately. The change in the filter must be applied to active sessions as well as new sessions without the need for restart of recompiling. If the ALG does not enforce dynamic traffic flow control based on organization-defined policies, this is a finding.
Fix: F-59341r1_fix
If the ALG is part of a CDS, configure the ALG to enforce dynamic flow control based on organization-defined policies.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000030
- Version
- SRG-NET-000280-ALG-000080
- Vuln IDs
-
- V-54489
- Rule IDs
-
- SV-68735r1_rule
Checks: C-55105r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify that policy filters exist that enforce traffic flow inbound and outbound across the controlled security boundary based on organization-defined metadata. If the ALG does not control traffic based on organization-defined metadata, this is a finding.
Fix: F-59343r1_fix
If the ALG is part of a CDS, configure inbound or outbound policy filters to enforce traffic flow across the controlled security boundary based on organization-defined metadata.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000030
- Version
- SRG-NET-000280-ALG-000081
- Vuln IDs
-
- V-54491
- Rule IDs
-
- SV-68737r1_rule
Checks: C-55107r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to block the transfer of data with malformed security attribute metadata structures. If the ALG is not configured to block the transfer of data with malformed security attribute metadata structures, this is a finding.
Fix: F-59345r1_fix
If the ALG is part of a CDS, configure the ALG to block the transfer of data with malformed security attribute metadata structures.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000031
- Version
- SRG-NET-000032-ALG-000082
- Vuln IDs
-
- V-54493
- Rule IDs
-
- SV-68739r1_rule
Checks: C-55109r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to enforce organization-defined one-way information flows using hardware mechanisms. If the ALG is not configured to enforce organization-defined one-way information flows using hardware mechanisms, this is a finding.
Fix: F-59347r1_fix
If the ALG is part of a CDS, configure the ALG to enforce organization-defined one-way information flows using hardware mechanisms.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000032
- Version
- SRG-NET-000033-ALG-000083
- Vuln IDs
-
- V-54495
- Rule IDs
-
- SV-68741r1_rule
Checks: C-55111r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows. If the ALG is not configured to enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows, this is a finding.
Fix: F-59349r1_fix
If the ALG is part of a CDS, configure the ALG to enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000329-ALG-000084
- Vuln IDs
-
- V-54497
- Rule IDs
-
- SV-68743r1_rule
Checks: C-55113r1_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to enforce the use of human reviews for organization-defined information flows under organization-defined conditions. If the ALG is not configured to enforce the use of human reviews for organization-defined information flows under organization-defined conditions, this is a finding.
Fix: F-59351r1_fix
If the ALG is part of a CDS, configure the ALG to enforce the use of human reviews for organization-defined information flows under organization-defined conditions.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-ALG-000085
- Vuln IDs
-
- V-54499
- Rule IDs
-
- SV-68745r1_rule
Checks: C-55115r1_chk
Review the ALG configuration to determine if services or functions not required for operation, or not related to ALG functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If unnecessary services and functions are enabled on the ALG, this is a finding.
Fix: F-59353r1_fix
Remove unneeded services and functions from the ALG. Removal is recommended since the service or function may be inadvertently enabled. However, if removal is not possible, disable the service or function.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-ALG-000086
- Vuln IDs
-
- V-54501
- Rule IDs
-
- SV-68747r1_rule
Checks: C-55117r2_chk
Review the ALG configuration to determine if application proxies are installed which are not related to the purpose of the gateway. If the ALG has unrelated or unneeded application proxy services installed, this is a finding.
Fix: F-59355r1_fix
Remove application proxy services that are unrelated or unneeded to the primary function of the ALG.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-ALG-000087
- Vuln IDs
-
- V-54503
- Rule IDs
-
- SV-68749r1_rule
Checks: C-55119r1_chk
View the configuration and vendor documentation of the ALG application to find the minimum ports, protocols, and services which are required for operation of the ALG. Compare enabled ports, protocols, and/or services with the Ports, Protocol, and Service Management (PPSM) and IAVM requirements. If ports, protocols, and/or services are not disabled or restricted as required by the PPSM, this is a finding.
Fix: F-59357r1_fix
Disable ports, protocols, and/or services not required for operation of the ALG application.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-NET-000337-ALG-000096
- Vuln IDs
-
- V-54505
- Rule IDs
-
- SV-68751r1_rule
Checks: C-55121r1_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to require users to re-authenticate when organization-defined circumstances or situations require re-authentication. If the ALG does not require users to re-authenticate when organization-defined circumstances or situations require re-authentication, this is a finding.
Fix: F-59359r1_fix
If user access control intermediary services are provided, configure the ALG to require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-NET-000138-ALG-000088
- Vuln IDs
-
- V-54507
- Rule IDs
-
- SV-68753r1_rule
Checks: C-55123r2_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG is configured with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges. If the ALG is not configured with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges, this is a finding.
Fix: F-59361r1_fix
If user access control intermediary services are provided, configure the ALG with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-NET-000138-ALG-000063
- Vuln IDs
-
- V-54509
- Rule IDs
-
- SV-68755r1_rule
Checks: C-55125r1_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users). If the ALG does not uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
Fix: F-59363r1_fix
If user access control intermediary services are provided, configure the ALG to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-NET-000138-ALG-000089
- Vuln IDs
-
- V-54511
- Rule IDs
-
- SV-68757r1_rule
Checks: C-55127r1_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to use a specific authentication server(s). If the ALG does not restrict user authentication traffic to a specific authentication server(s), this is a finding.
Fix: F-59365r1_fix
If user authentication intermediary services are provided, configure the ALG to use a specific authentication server(s).
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001951
- Version
- SRG-NET-000339-ALG-000090
- Vuln IDs
-
- V-54513
- Rule IDs
-
- SV-68759r2_rule
Checks: C-55129r1_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG implements multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the ALG does not implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-59367r1_fix
If user authentication intermediary services are provided, configure the ALG to implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- SRG-NET-000340-ALG-000091
- Vuln IDs
-
- V-54515
- Rule IDs
-
- SV-68761r1_rule
Checks: C-55131r1_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the ALG does not implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-59369r1_fix
If user authentication intermediary services are provided, configure the ALG to implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-NET-000140-ALG-000094
- Vuln IDs
-
- V-54521
- Rule IDs
-
- SV-68767r1_rule
Checks: C-55137r1_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to use multifactor authentication for network access to non-privileged accounts. If the ALG does not use multifactor authentication for network access to non-privileged accounts, this is a finding.
Fix: F-59375r1_fix
If user authentication intermediary services are provided, configure the ALG to use multifactor authentication for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001942
- Version
- SRG-NET-000147-ALG-000095
- Vuln IDs
-
- V-54523
- Rule IDs
-
- SV-68769r2_rule
Checks: C-55139r1_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to implement replay-resistant authentication mechanisms for network access to non-privileged accounts. If the ALG does not implement replay-resistant authentication mechanisms for network access to non-privileged accounts, this is a finding.
Fix: F-59377r1_fix
If user authentication intermediary services are provided, configure the ALG to implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-NET-000400-ALG-000097
- Vuln IDs
-
- V-54525
- Rule IDs
-
- SV-68771r1_rule
Checks: C-55141r1_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG transmits only encrypted representations of passwords. If the ALG does not transmit only encrypted representations of passwords, this is a finding.
Fix: F-59379r1_fix
If user authentication intermediary services are provided, configure the ALG to transmit only encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-NET-000344-ALG-000098
- Vuln IDs
-
- V-54527
- Rule IDs
-
- SV-68773r1_rule
Checks: C-55143r1_chk
Verify the ALG prohibits the use of cached authenticators after an organization-defined time period. If the ALG does not prohibit the use of cached authenticators after an organization-defined time period, this is a finding.
Fix: F-59381r1_fix
Configure the ALG to prohibit the use of cached authenticators after an organization-defined time period.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001991
- Version
- SRG-NET-000345-ALG-000099
- Vuln IDs
-
- V-54529
- Rule IDs
-
- SV-68775r1_rule
Checks: C-55145r2_chk
If the ALG does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the ALG implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If the ALG does not implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network, this is a finding.
Fix: F-59383r2_fix
If PKI-based user authentication intermediary services are provided, configure the ALG to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-NET-000164-ALG-000100
- Vuln IDs
-
- V-54531
- Rule IDs
-
- SV-68777r1_rule
Checks: C-55147r2_chk
If the ALG does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS), this is not applicable. Verify the ALG validates certificates used for TLS functions by performing RFC 5280-compliant certification path validation. If the ALG does not validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation, this is a finding.
Fix: F-59385r2_fix
If intermediary services for TLS are provided, configure the ALG to validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-NET-000166-ALG-000101
- Vuln IDs
-
- V-54533
- Rule IDs
-
- SV-68779r1_rule
Checks: C-55149r2_chk
If the ALG does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the ALG maps the authenticated identity to the user account for PKI-based authentication. If the ALG does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.
Fix: F-59387r2_fix
If PKI-based user authentication intermediary services are provided, configure the ALG to map the authenticated identities to the user account.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- SRG-NET-000169-ALG-000102
- Vuln IDs
-
- V-54535
- Rule IDs
-
- SV-68781r1_rule
Checks: C-55151r1_chk
If intermediary services are not provided to non-organizational users, this is not applicable. If the ALG does not provide user authentication intermediary services, this is not applicable. Review the ALG authentication functions. Verify identification and authentication is required for non-organizational users. Examine the policy filters to verify a rule exists to deny access to unauthenticated, non-organizational users. If the ALG does not uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users, this is a finding.
Fix: F-59389r1_fix
If user authentication intermediary services are provided, configure ALG to uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002014
- Version
- SRG-NET-000349-ALG-000106
- Vuln IDs
-
- V-54543
- Rule IDs
-
- SV-68789r1_rule
Checks: C-55159r1_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG conform to FICAM-issued profiles. If the ALG does not conform to FICAM-issued profiles, this is a finding.
Fix: F-59397r1_fix
If user authentication intermediary services are provided, configure ALG to conform to FICAM-issued profiles.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SRG-NET-000213-ALG-000107
- Vuln IDs
-
- V-54545
- Rule IDs
-
- SV-68791r1_rule
Checks: C-55161r1_chk
Verify the ALG terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity. If the ALG does not terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, this is a finding.
Fix: F-59399r1_fix
Configure ALG to terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-ALG-000025
- Vuln IDs
-
- V-54547
- Rule IDs
-
- SV-68793r1_rule
Checks: C-55163r1_chk
If the ALG does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC), this is not applicable. Verify the ALG implements NIST FIPS-validated cryptography to generate cryptographic hashes. If the ALG does not implement NIST FIPS-validated cryptography to generate cryptographic hashes, this is a finding
Fix: F-59401r1_fix
If encryption intermediary services are provided, configure the ALG to implement NIST FIPS-validated cryptography to generate cryptographic hashes.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-ALG-000040
- Vuln IDs
-
- V-54549
- Rule IDs
-
- SV-68795r1_rule
Checks: C-55165r1_chk
If the ALG does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC), this is not applicable. Verify the ALG implements NIST FIPS-validated cryptography to implement for digital signatures. If the ALG does not implement NIST FIPS-validated cryptography for digital signatures, this is a finding.
Fix: F-59403r1_fix
If encryption intermediary services are provided, configure the ALG to implement NIST FIPS-validated cryptography for digital signatures.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-ALG-000111
- Vuln IDs
-
- V-54551
- Rule IDs
-
- SV-68797r1_rule
Checks: C-55167r1_chk
If the ALG does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC), this is not applicable. Verify the ALG uses NIST FIPS-validated cryptography to implement encryption services. If the ALG does not use NIST FIPS-validated cryptography to implement encryption services, this is a finding.
Fix: F-59405r1_fix
If encryption intermediary services are provided, configure the ALG to use NIST FIPS-validated cryptography to implement encryption services.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-NET-000228-ALG-000108
- Vuln IDs
-
- V-54609
- Rule IDs
-
- SV-68855r1_rule
Checks: C-55229r1_chk
Verify the ALG detects, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment. If the ALG does not detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment, this is a finding.
Fix: F-59465r1_fix
Configure the ALG to detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- SRG-NET-000288-ALG-000109
- Vuln IDs
-
- V-54611
- Rule IDs
-
- SV-68857r1_rule
Checks: C-55231r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG blocks or restricts detected prohibited mobile code. If the ALG does not block or restrict detected prohibited mobile code, this is a finding.
Fix: F-59467r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to block or restrict detected prohibited mobile code.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- SRG-NET-000289-ALG-000110
- Vuln IDs
-
- V-54613
- Rule IDs
-
- SV-68859r1_rule
Checks: C-55233r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents the download of prohibited mobile code. If the ALG does not prevent the download of prohibited mobile code, this is a finding.
Fix: F-59469r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent the download of prohibited mobile code.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-NET-000230-ALG-000113
- Vuln IDs
-
- V-54615
- Rule IDs
-
- SV-68861r1_rule
Checks: C-55235r1_chk
Verify the ALG protects the authenticity of communications sessions. If the ALG does not protect the authenticity of communications sessions, this is a finding.
Fix: F-59471r1_fix
Configure ALG to protect the authenticity of communications sessions.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-NET-000231-ALG-000114
- Vuln IDs
-
- V-54617
- Rule IDs
-
- SV-68863r1_rule
Checks: C-55237r1_chk
Verify the ALG invalidates session identifiers upon user logout or other session termination. If the ALG does not invalidate session identifiers upon user logout or other session termination, this is a finding.
Fix: F-59473r1_fix
Configure ALG to invalidate session identifiers upon user logout or other session termination.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-NET-000233-ALG-000115
- Vuln IDs
-
- V-54619
- Rule IDs
-
- SV-68865r1_rule
Checks: C-55239r1_chk
Verify the ALG recognizes only system-generated session identifiers. If the ALG does not recognize only system-generated session identifiers, this is a finding.
Fix: F-59475r1_fix
Configure ALG to recognize only system-generated session identifiers.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-NET-000234-ALG-000116
- Vuln IDs
-
- V-54621
- Rule IDs
-
- SV-68867r1_rule
Checks: C-55241r1_chk
Verify the ALG generates unique session identifiers using a FIPS 140-2 approved random number generator. If the ALG does not generate unique session identifiers using a FIPS 140-2 approved random number generator, this is a finding.
Fix: F-59477r1_fix
Configure ALG to generate unique session identifiers using a FIPS 140-2 approved random number generator.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-NET-000355-ALG-000117
- Vuln IDs
-
- V-54623
- Rule IDs
-
- SV-68869r1_rule
Checks: C-55243r3_chk
If the ALG does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the ALG only accepts end entity certificates issued by DoD PKI or DoD-approved PKI CAs for the establishment of protected sessions. If the ALG accepts non-DoD approved PKI end entity certificates, this is a finding.
Fix: F-59479r2_fix
If PKI-based user authentication intermediary services are provided, configure the ALG to only accept end entity certificates issued by DoD PKI or DoD-approved PKI CAs for the establishment of protected sessions.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-NET-000236-ALG-000119
- Vuln IDs
-
- V-54625
- Rule IDs
-
- SV-68871r1_rule
Checks: C-55245r2_chk
Verify the ALG, in the event of a system failure, saves diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted. If the ALG does not save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted, this is a finding.
Fix: F-59481r1_fix
Configure the ALG, in the event of a system failure, to save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-ALG-000120
- Vuln IDs
-
- V-54627
- Rule IDs
-
- SV-68873r1_rule
Checks: C-55247r1_chk
Verify the ALG implements load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks. If the device does not implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks, this is a finding.
Fix: F-59483r1_fix
Configure the ALG to implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-ALG-000112
- Vuln IDs
-
- V-54629
- Rule IDs
-
- SV-68875r1_rule
Checks: C-55249r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG protects against or limits the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis. If the ALG does not protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis, this is a finding.
Fix: F-59485r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-ALG-000155
- Vuln IDs
-
- V-54631
- Rule IDs
-
- SV-68877r1_rule
Checks: C-55251r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG protects against or limits the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors. If the ALG does not protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors, this is a finding.
Fix: F-59487r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-ALG-000126
- Vuln IDs
-
- V-54633
- Rule IDs
-
- SV-68879r1_rule
Checks: C-55253r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG protects against or limits the effects of known types of DoS attacks by employing signatures. If the ALG does not protect against or limit the effects of known types of DoS attacks by employing signatures, this is a finding.
Fix: F-59489r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to protect against or limit the effects of known types of DoS attacks by employing signatures.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-NET-000192-ALG-000121
- Vuln IDs
-
- V-54635
- Rule IDs
-
- SV-68881r1_rule
Checks: C-55255r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG is configured to block outbound traffic containing known and unknown DoS attacks. If the ALG does not block outbound traffic containing known and unknown DoS attacks, this is a finding.
Fix: F-59491r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to block outbound traffic containing known and unknown DoS attacks.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-ALG-000122
- Vuln IDs
-
- V-54637
- Rule IDs
-
- SV-68883r1_rule
Checks: C-55257r1_chk
Verify the ALG only allows incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations. If the ALG allows incoming communications from unauthorized sources routed to unauthorized destinations, this is a finding.
Fix: F-59493r1_fix
Configure the ALG to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001126
- Version
- SRG-NET-000365-ALG-000123
- Vuln IDs
-
- V-54639
- Rule IDs
-
- SV-68885r1_rule
Checks: C-55259r1_chk
Verify the ALG fails securely in the event of an operational failure. If the ALG does not fail securely in the event of an operational failure, this is a finding.
Fix: F-59495r1_fix
Configure the ALG to fail securely in the event of an operational failure.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001109
- Version
- SRG-NET-000202-ALG-000124
- Vuln IDs
-
- V-54641
- Rule IDs
-
- SV-68887r1_rule
Checks: C-55261r1_chk
Verify the ALG denies network communications traffic by default and allows network communications traffic by exception on both inbound and outbound interfaces. If the ALG does not deny network communications traffic by default and allow network communications traffic by exception on both inbound and outbound interfaces, this is a finding.
Fix: F-59497r1_fix
Configure the ALG to deny network communications traffic by default and allow network communications traffic by exception on both inbound and outbound interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002400
- Version
- SRG-NET-000370-ALG-000125
- Vuln IDs
-
- V-54643
- Rule IDs
-
- SV-68889r1_rule
Checks: C-55263r1_chk
Verify the ALG identifies and logs internal users associated with denied outgoing communications traffic posing a threat to external information systems. If the ALG does not identify and log internal users associated with denied outgoing communications traffic posing a threat to external information systems, this is a finding.
Fix: F-59499r1_fix
Configure the ALG to identify and log internal users associated with denied outgoing communications traffic posing a threat to external information systems.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-NET-000401-ALG-000127
- Vuln IDs
-
- V-54645
- Rule IDs
-
- SV-68891r1_rule
Checks: C-55265r1_chk
Verify the ALG checks the validity of all data inputs except those specifically identified by the organization. If the ALG does not check the validity of all data inputs except those specifically identified by the organization, this is a finding.
Fix: F-59501r1_fix
Configure the ALG to check the validity of all data inputs except those specifically identified by the organization.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-NET-000380-ALG-000128
- Vuln IDs
-
- V-54647
- Rule IDs
-
- SV-68893r1_rule
Checks: C-55267r1_chk
Verify the ALG behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If the ALG does not behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received, this is a finding.
Fix: F-59503r1_fix
Configure the ALG to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-NET-000273-ALG-000129
- Vuln IDs
-
- V-54649
- Rule IDs
-
- SV-68895r1_rule
Checks: C-55269r1_chk
Verify the ALG generates error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries. If the ALG does not generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries, this is a finding.
Fix: F-59505r1_fix
Configure the ALG to generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-NET-000402-ALG-000130
- Vuln IDs
-
- V-54651
- Rule IDs
-
- SV-68897r1_rule
Checks: C-55271r1_chk
Verify the ALG reveals error messages only to the ISSO, ISSM, and SCA. If the ALG does not reveal error messages only to the ISSO, ISSM, and SCA, this is a finding.
Fix: F-59507r1_fix
Configure the ALG to reveal error messages only to the ISSO, ISSM, and SCA.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001247
- Version
- SRG-NET-000251-ALG-000131
- Vuln IDs
-
- V-54653
- Rule IDs
-
- SV-68899r1_rule
Checks: C-55273r1_chk
If the ALG does not perform content filtering as part of its traffic management functionality, this is not applicable. Verify the ALG automatically updates malicious code protection mechanisms. If the ALG does not automatically update malicious code protection mechanisms, this is a finding.
Fix: F-59509r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to automatically update malicious code protection mechanisms.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001240
- Version
- SRG-NET-000246-ALG-000132
- Vuln IDs
-
- V-54655
- Rule IDs
-
- SV-68901r1_rule
Checks: C-55275r1_chk
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG updates malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures. If the ALG does not update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures, this is a finding.
Fix: F-59511r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- SRG-NET-000248-ALG-000133
- Vuln IDs
-
- V-54657
- Rule IDs
-
- SV-68903r1_rule
Checks: C-55277r1_chk
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG performs real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed. If the ALG does not perform real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed, this is a finding.
Fix: F-59513r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to perform real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-ALG-000134
- Vuln IDs
-
- V-54659
- Rule IDs
-
- SV-68905r1_rule
Checks: C-55279r1_chk
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG blocks malicious code upon detection. If the ALG does not block malicious code when detected, this is a finding.
Fix: F-59515r1_fix
If the ALG performs content filtering as part of its traffic management functionality, configure the ALG to block malicious code upon detection.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-ALG-000145
- Vuln IDs
-
- V-54661
- Rule IDs
-
- SV-68907r1_rule
Checks: C-55281r1_chk
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG blocks and either deletes or quarantines malicious code upon detection. If the ALG does not block and either delete or quarantine malicious code upon detection, this is a finding.
Fix: F-59517r1_fix
If content filtering is provided as part of the traffic management functionality, configure the ALG to block and either delete or quarantine malicious code when it is detected.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-ALG-000146
- Vuln IDs
-
- V-54663
- Rule IDs
-
- SV-68909r1_rule
Checks: C-55283r2_chk
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG sends an immediate (within seconds) alert to the system administrator, at a minimum, when malicious code is detected. If the ALG does not send an immediate (within seconds) alert to the system administrator, at a minimum, when malicious code is detected, this is a finding.
Fix: F-59519r2_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to send an immediate (within seconds) alert to the system administrator, at a minimum, when malicious code is detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002656
- Version
- SRG-NET-000383-ALG-000135
- Vuln IDs
-
- V-54665
- Rule IDs
-
- SV-68911r1_rule
Checks: C-55285r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG integrates with a system-wide intrusion detection system. If the ALG does not integrate with a system-wide intrusion detection system, this is a finding.
Fix: F-59521r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to integrate with a system-wide intrusion detection system.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002683
- Version
- SRG-NET-000384-ALG-000136
- Vuln IDs
-
- V-54667
- Rule IDs
-
- SV-68913r1_rule
Checks: C-55287r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum. If the ALG does not detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum, this is a finding.
Fix: F-59523r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002684
- Version
- SRG-NET-000385-ALG-000137
- Vuln IDs
-
- V-54669
- Rule IDs
-
- SV-68915r1_rule
Checks: C-55289r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates a log record when unauthorized network services are detected. If the ALG does not generate a log record when unauthorized network services are detected, this is a finding.
Fix: F-59525r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate a log record when unauthorized network services are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002684
- Version
- SRG-NET-000385-ALG-000138
- Vuln IDs
-
- V-54671
- Rule IDs
-
- SV-68917r1_rule
Checks: C-55291r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected, this is a finding.
Fix: F-59527r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002661
- Version
- SRG-NET-000390-ALG-000139
- Vuln IDs
-
- V-54673
- Rule IDs
-
- SV-68919r1_rule
Checks: C-55293r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG continuously monitors inbound communications traffic for unusual or unauthorized activities or conditions. If the ALG does not continuously monitor inbound communications traffic for unusual or unauthorized activities or conditions, this is a finding.
Fix: F-59529r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to continuously monitor inbound communications traffic for unusual or unauthorized activities or conditions.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002662
- Version
- SRG-NET-000391-ALG-000140
- Vuln IDs
-
- V-54675
- Rule IDs
-
- SV-68921r1_rule
Checks: C-55295r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG continuously monitors outbound communications traffic for unusual or unauthorized activities or conditions. If the ALG does not continuously monitor outbound communications traffic for unusual or unauthorized activities or conditions, this is a finding.
Fix: F-59531r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to continuously monitor outbound communications traffic for unusual or unauthorized activities or conditions.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000141
- Vuln IDs
-
- V-54677
- Rule IDs
-
- SV-68923r1_rule
Checks: C-55297r2_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG sends an alert to, at a minimum, the ISSO and ISSM when detection events occur. If the ALG does not send an alert to, at a minimum, the ISSO and ISSM when detection events from real-time monitoring of communications traffic occur, this is a finding.
Fix: F-59533r2_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to send an alert to, at a minimum, the ISSO and ISSM when detection events occur.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000142
- Vuln IDs
-
- V-54679
- Rule IDs
-
- SV-68925r1_rule
Checks: C-55299r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected, this is a finding.
Fix: F-59535r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000143
- Vuln IDs
-
- V-54681
- Rule IDs
-
- SV-68927r1_rule
Checks: C-55301r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected, this is a finding.
Fix: F-59537r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000147
- Vuln IDs
-
- V-54683
- Rule IDs
-
- SV-68929r1_rule
Checks: C-55303r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected, this is a finding.
Fix: F-59539r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000148
- Vuln IDs
-
- V-54685
- Rule IDs
-
- SV-68931r1_rule
Checks: C-55305r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected, this is a finding.
Fix: F-59541r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000149
- Vuln IDs
-
- V-54687
- Rule IDs
-
- SV-68933r1_rule
Checks: C-55307r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected, this is a finding.
Fix: F-59543r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- SRG-NET-000393-ALG-000144
- Vuln IDs
-
- V-54689
- Rule IDs
-
- SV-68935r1_rule
Checks: C-55309r1_chk
If the ALG does not provide spam protection functions, this is not applicable. Verify the ALG automatically updates spam protection mechanisms. If the ALG does not automatically update spam protection mechanisms, this is a finding.
Fix: F-59545r1_fix
If the ALG provides spam protection functions, configure the ALG to automatically update spam protection mechanisms.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000501-ALG-000036
- Vuln IDs
-
- V-54761
- Rule IDs
-
- SV-69007r1_rule
Checks: C-55383r1_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to delete security objects occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete security objects occur, this is a finding.
Fix: F-59619r1_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to delete security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000502-ALG-000037
- Vuln IDs
-
- V-54763
- Rule IDs
-
- SV-69009r1_rule
Checks: C-55385r1_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur, this is a finding.
Fix: F-59621r1_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000505-ALG-000039
- Vuln IDs
-
- V-54765
- Rule IDs
-
- SV-69011r1_rule
Checks: C-55387r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records showing starting and ending time for user access to the system. If the ALG does not generate audit records showing starting and ending time for user access to the system, this is a finding.
Fix: F-59623r1_fix
If user access control intermediary services are provided, configure the ALG to generate audit records showing starting and ending time for user access to the system.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001919
- Version
- SRG-NET-000331-ALG-000041
- Vuln IDs
-
- V-54767
- Rule IDs
-
- SV-69013r1_rule
Checks: C-55389r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG provides the capability for authorized users to select a user session to capture or view. If the ALG does not provide the capability for authorized users to select a user session to capture or view, this is a finding.
Fix: F-59625r1_fix
If user access control intermediary services are provided, configure the ALG to provide the capability for authorized users to select a user session to capture or view.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001462
- Version
- SRG-NET-000399-ALG-000042
- Vuln IDs
-
- V-54769
- Rule IDs
-
- SV-69015r1_rule
Checks: C-55391r1_chk
If the ALG does not provide user access control and intermediary services, this is not applicable. Verify the ALG provides the capability for authorized users to capture, record, and log all content related to a user session. If the ALG does not provide the capability for authorized users to capture, record, and log all content related to a user session, this is a finding.
Fix: F-59627r1_fix
If user access control intermediary services are provided, configure the ALG to provide the capability for authorized users to capture, record, and log all content related to a user session.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-ALG-000020
- Vuln IDs
-
- V-54771
- Rule IDs
-
- SV-69017r1_rule
Checks: C-55393r1_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the ALG does not detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
Fix: F-59629r1_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-ALG-000118
- Vuln IDs
-
- V-54773
- Rule IDs
-
- SV-69019r1_rule
Checks: C-55395r1_chk
Verify the ALG function fails to a secure state upon failure of initialization, shutdown, or abort actions. If the ALG function does not fail to a secure state upon failure of initialization, shutdown, or abort actions, this is a finding.
Fix: F-59631r1_fix
Configure the ALG to fail to a secure state upon failure of initialization, shutdown, or abort actions.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SRG-NET-000521-ALG-000002
- Vuln IDs
-
- V-56189
- Rule IDs
-
- SV-70443r1_rule
Checks: C-56739r2_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG conceals, via the session lock, information previously visible on the display with a publicly viewable image. If the ALG does not conceal, via the session lock, information previously visible on the display with a publicly viewable image, this is a finding.
Fix: F-61065r1_fix
If user access control intermediary services are provided, configure the ALG to conceal, via the session lock, information previously visible on the display with a publicly viewable image.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-NET-000514-ALG-000514
- Vuln IDs
-
- V-56191
- Rule IDs
-
- SV-70445r1_rule
Checks: C-56741r2_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG initiates a session lock after a 15-minute period of inactivity. If the ALG does not initiate a session lock after a 15-minute period of inactivity, this is a finding.
Fix: F-61067r2_fix
If user access control intermediary services are provided, configure the ALG to initiate a session lock after a 15-minute period of inactivity.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000058
- Version
- SRG-NET-000515-ALG-000515
- Vuln IDs
-
- V-56193
- Rule IDs
-
- SV-70447r1_rule
Checks: C-56743r2_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG provides the capability for users to directly initiate a session lock. If the ALG does not provide the capability for users to directly initiate a session lock, this is a finding.
Fix: F-61069r2_fix
If user access control intermediary services are provided, configure the ALG to provide the capability for users to directly initiate a session lock.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SRG-NET-000516-ALG-000516
- Vuln IDs
-
- V-56195
- Rule IDs
-
- SV-70449r1_rule
Checks: C-56745r2_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG retains the session lock until the user reestablishes access using established identification and authentication procedures. If the ALG does not retain the session lock until the user reestablishes access using established identification and authentication procedures, this is a finding.
Fix: F-61071r2_fix
If user access control intermediary services are provided, configure the ALG to retain the session lock until the user reestablishes access using established identification and authentication procedures.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-NET-000517-ALG-000006
- Vuln IDs
-
- V-56197
- Rule IDs
-
- SV-70451r1_rule
Checks: C-56747r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG automatically terminates a user session when organization-defined conditions or trigger events that require a session disconnect occur. If the ALG does not automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur, this is a finding.
Fix: F-61073r1_fix
If user access control intermediary services are provided, configure the ALG to automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-NET-000518-ALG-000007
- Vuln IDs
-
- V-56199
- Rule IDs
-
- SV-70453r1_rule
Checks: C-56749r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG provides a logoff capability for user-initiated communications sessions. If the ALG does not provide a logoff capability for user-initiated communications sessions, this is a finding.
Fix: F-61075r1_fix
If user access control intermediary services are provided, configure the ALG to provide a logoff capability for user-initiated communications sessions.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-NET-000519-ALG-000008
- Vuln IDs
-
- V-56201
- Rule IDs
-
- SV-70455r1_rule
Checks: C-56751r1_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG displays an explicit logoff message to users indicating the reliable termination of authenticated communications sessions. If the ALG does not display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions, this is a finding.
Fix: F-61077r1_fix
If user access control intermediary services are provided, configure the ALG to display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-NET-000062-ALG-000092
- Vuln IDs
-
- V-56203
- Rule IDs
-
- SV-70457r1_rule
Checks: C-56753r1_chk
If the ALG does not generate or store secret or private keys, this is not applicable. Verify the ALG uses a FIPS 140-2 validated cryptographic module for private key generation, storage and access. If the ALG does not use or support a FIPS 140-2 validated cryptographic module for producing, storing and accessing private key data, this is a finding.
Fix: F-61079r1_fix
For ALGs that store secret or private keys, configure the ALG settings to ensure it uses a FIPS 140-2 validated cryptographic module for generating, storing and accessing private keys.