Application Layer Gateway Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-NET-000015-ALG-000016
- Vuln IDs
-
- V-204909
- V-54375
- Rule IDs
-
- SV-204909r395862_rule
- SV-68621
Checks: C-5177r395860_chk
Verify the ALG is configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies. If the ALG is not configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies, this is a finding.
Fix: F-5177r395861_fix
Configure the ALG to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-ALG-000017
- Vuln IDs
-
- V-204910
- V-54377
- Rule IDs
-
- SV-204910r395865_rule
- SV-68623
Checks: C-5178r395863_chk
Verify the ALG is configured to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic. If the ALG is not configured to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic, this is a finding.
Fix: F-5178r395864_fix
Configure the ALG to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-ALG-000018
- Vuln IDs
-
- V-204911
- V-54379
- Rule IDs
-
- SV-204911r395868_rule
- SV-68625
Checks: C-5179r395866_chk
Verify the ALG restricts or blocks harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic. If the ALG does not restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic, this is a finding.
Fix: F-5179r395867_fix
Configure the ALG to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-ALG-000019
- Vuln IDs
-
- V-204912
- V-54385
- Rule IDs
-
- SV-204912r395871_rule
- SV-68631
Checks: C-5180r395869_chk
Verify the ALG immediately uses updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions. If the ALG does not immediately use updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions, this is a finding.
Fix: F-5180r395870_fix
Configure the ALG to immediately use updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-ALG-000021
- Vuln IDs
-
- V-204913
- V-54387
- Rule IDs
-
- SV-204913r395874_rule
- SV-68633
Checks: C-5181r395872_chk
If the ALG is not used as part of a CDS, this is not applicable. Verify the ALG applies information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software. If the ALG is not configured to apply information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software, this is a finding.
Fix: F-5181r395873_fix
If the ALG is used as part of a CDS, configure the ALG to apply information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000034
- Version
- SRG-NET-000021-ALG-000068
- Vuln IDs
-
- V-204914
- V-54465
- Rule IDs
-
- SV-204914r987724_rule
- SV-68711
Checks: C-5182r395875_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG allows privileged administrators to enable/disable all security policy filters used to enforce information flow control. If the ALG is not configured to allow privileged administrators to enable/disable all security policy filters used to enforce information flow control, this is a finding.
Fix: F-5182r395876_fix
If the ALG is part of a CDS, configure the ALG to allow privileged administrators to enable/disable all security policy filters used to enforce information flow control.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000035
- Version
- SRG-NET-000022-ALG-000069
- Vuln IDs
-
- V-204915
- V-54467
- Rule IDs
-
- SV-204915r987725_rule
- SV-68713
Checks: C-5183r395878_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG allows privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control. If the ALG does not allow privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control, this is a finding.
Fix: F-5183r395879_fix
If the ALG is part of a CDS, configure the ALG to allow privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000027
- Version
- SRG-NET-000029-ALG-000079
- Vuln IDs
-
- V-204916
- V-54487
- Rule IDs
-
- SV-204916r987726_rule
- SV-68733
Checks: C-5184r395881_chk
If the ALG is not part of a CDS, this is not applicable. Verify changes made to the policy filters (e.g., rules sets or content filters) take effect immediately. The change in the filter must be applied to active sessions as well as new sessions without the need for restart of recompiling. If the ALG does not enforce dynamic traffic flow control based on organization-defined policies, this is a finding.
Fix: F-5184r395882_fix
If the ALG is part of a CDS, configure the ALG to enforce dynamic flow control based on organization-defined policies.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000031
- Version
- SRG-NET-000032-ALG-000082
- Vuln IDs
-
- V-204917
- V-54493
- Rule IDs
-
- SV-204917r987728_rule
- SV-68739
Checks: C-5185r395884_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to enforce organization-defined one-way information flows using hardware mechanisms. If the ALG is not configured to enforce organization-defined one-way information flows using hardware mechanisms, this is a finding.
Fix: F-5185r395885_fix
If the ALG is part of a CDS, configure the ALG to enforce organization-defined one-way information flows using hardware mechanisms.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000032
- Version
- SRG-NET-000033-ALG-000083
- Vuln IDs
-
- V-204918
- V-54495
- Rule IDs
-
- SV-204918r987729_rule
- SV-68741
Checks: C-5186r395887_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows. If the ALG is not configured to enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows, this is a finding.
Fix: F-5186r395888_fix
If the ALG is part of a CDS, configure the ALG to enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-NET-000041-ALG-000022
- Vuln IDs
-
- V-204919
- V-54389
- Rule IDs
-
- SV-204919r395892_rule
- SV-68635
Checks: C-5187r395890_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG displays the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network. If the ALG does not display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network, this is a finding.
Fix: F-5187r395891_fix
If user access control intermediary services are provided, configure the ALG to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-NET-000042-ALG-000023
- Vuln IDs
-
- V-204920
- V-54391
- Rule IDs
-
- SV-204920r395895_rule
- SV-68637
Checks: C-5188r395893_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG retains the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and takes explicit actions to log on for further access. If the ALG does not retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access, this is a finding.
Fix: F-5188r395894_fix
If user access control intermediary services are provided, configure the ALG to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- SRG-NET-000043-ALG-000024
- Vuln IDs
-
- V-204921
- V-54393
- Rule IDs
-
- SV-204921r395898_rule
- SV-68639
Checks: C-5189r395896_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG displays the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system. If the ALG does not display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system, this is a finding.
Fix: F-5189r395897_fix
If user access control intermediary services are provided, configure the ALG to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-NET-000053-ALG-000001
- Vuln IDs
-
- V-204922
- V-54337
- Rule IDs
-
- SV-204922r395901_rule
- SV-68583
Checks: C-5190r395899_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG limits the number of concurrent sessions to an organization-defined number for all accounts and/or account types. If the ALG does not limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types, this is a finding.
Fix: F-5190r395900_fix
If user access control intermediary services are provided, configure the ALG to limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-NET-000061-ALG-000009
- Vuln IDs
-
- V-204923
- V-54353
- Rule IDs
-
- SV-204923r395904_rule
- SV-68599
Checks: C-5191r395902_chk
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG is configured to inspect traffic or forward to a monitoring device for inspection prior to forwarding to inbound or outbound destinations. Verify that the communications package is either forwarded or disallowed and that the process does not alter the original data payload that is forwarded to the destination application. If the ALG does not ensure inbound and outbound traffic is monitored for compliance with remote access security policies, this is a finding.
Fix: F-5191r395903_fix
If intermediary services for remote access communications traffic are provided, configure the ALG to either provide content inspection for inbound and outbound traffic or route the traffic to be inspected for compliance with remote access security policies.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-NET-000062-ALG-000011
- Vuln IDs
-
- V-204924
- V-54357
- Rule IDs
-
- SV-204924r395907_rule
- SV-68603
Checks: C-5192r395905_chk
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG uses encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions. If the ALG does not use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions, this is a finding.
Fix: F-5192r395906_fix
If intermediary services for remote access communications traffic are provided, configure the ALG to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-NET-000062-ALG-000092
- Vuln IDs
-
- V-204925
- V-56203
- Rule IDs
-
- SV-204925r395910_rule
- SV-70457
Checks: C-5193r395908_chk
If the ALG does not generate or store secret or private keys, this is not applicable. Verify the ALG uses a FIPS 140-2 validated cryptographic module for private key generation, storage and access. If the ALG does not use or support a FIPS 140-2 validated cryptographic module for producing, storing and accessing private key data, this is a finding.
Fix: F-5193r395909_fix
For ALGs that store secret or private keys, configure the ALG settings to ensure it uses a FIPS 140-2 validated cryptographic module for generating, storing and accessing private keys.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-NET-000062-ALG-000150
- Vuln IDs
-
- V-204926
- V-54359
- Rule IDs
-
- SV-204926r395913_rule
- SV-68605
Checks: C-5194r395911_chk
If the ALG does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS), this is not applicable. Verify the ALG is configured to implement the applicable required TLS settings in NIST PUB SP 800-52. If the ALG is not configured to implement the applicable required TLS settings in NIST PUB SP 800-52, this is a finding.
Fix: F-5194r395912_fix
If intermediary services for TLS are provided, configure the ALG to comply with applicable required TLS settings in NIST PUB SP 800-52.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-NET-000063-ALG-000012
- Vuln IDs
-
- V-204927
- V-54361
- Rule IDs
-
- SV-204927r395916_rule
- SV-68607
Checks: C-5195r395914_chk
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG uses cryptography to protect the integrity of remote access sessions. If the ALG does not use cryptography to protect the integrity of remote access sessions, this is a finding.
Fix: F-5195r395915_fix
If intermediary services for remote access communications traffic are provided, configure the ALG to use cryptography to protect the integrity of remote access sessions.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-NET-000074-ALG-000043
- Vuln IDs
-
- V-204928
- V-54417
- Rule IDs
-
- SV-204928r395919_rule
- SV-68663
Checks: C-5196r395917_chk
Verify the ALG produces audit records containing information to establish what type of events occurred. If the ALG does not produce audit records containing information to establish what type of events occurred, this is a finding.
Fix: F-5196r395918_fix
Configure the ALG to produce audit records containing information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-NET-000075-ALG-000044
- Vuln IDs
-
- V-204929
- V-54419
- Rule IDs
-
- SV-204929r395922_rule
- SV-68665
Checks: C-5197r395920_chk
Verify the ALG produces audit records containing information to establish when (date and time) the events occurred. If the ALG does not produce audit records containing information to establish when (date and time) the events occurred, this is a finding.
Fix: F-5197r395921_fix
Configure the ALG to produce audit records containing information to establish when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-ALG-000045
- Vuln IDs
-
- V-204930
- V-54421
- Rule IDs
-
- SV-204930r395925_rule
- SV-68667
Checks: C-5198r395923_chk
Verify the ALG produces audit records containing information to establish where the events occurred. If the ALG does not produce audit records containing information to establish where the events occurred, this is a finding.
Fix: F-5198r395924_fix
Configure the ALG to produce audit records containing information to establish where the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-NET-000077-ALG-000046
- Vuln IDs
-
- V-204931
- V-54423
- Rule IDs
-
- SV-204931r395928_rule
- SV-68669
Checks: C-5199r395926_chk
Verify the ALG produces audit records containing information to establish the source of the events. If the ALG does not produce audit records containing information to establish the source of the events, this is a finding.
Fix: F-5199r395927_fix
Configure the ALG to produce audit records containing information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000078-ALG-000047
- Vuln IDs
-
- V-204932
- V-54425
- Rule IDs
-
- SV-204932r395931_rule
- SV-68671
Checks: C-5200r395929_chk
Verify the ALG produces audit records containing information to establish the outcome of the events. If the ALG does not produce audit records containing information to establish the outcome of the events, this is a finding.
Fix: F-5200r395930_fix
Configure the ALG to produce audit records containing information to establish the outcome of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-NET-000079-ALG-000048
- Vuln IDs
-
- V-204933
- V-54427
- Rule IDs
-
- SV-204933r395934_rule
- SV-68673
Checks: C-5201r395932_chk
Verify the ALG produces audit records containing information to establish the identity of any individual or process associated with the event. If the ALG does not produce audit records containing information to establish the identity of any individual or process associated with the event, this is a finding.
Fix: F-5201r395933_fix
Configure the ALG to produce audit records containing information to establish the identity of any individual or process associated with the event.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-NET-000088-ALG-000054
- Vuln IDs
-
- V-204934
- V-54439
- Rule IDs
-
- SV-204934r395937_rule
- SV-68685
Checks: C-5202r395935_chk
Verify the ALG sends an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs. If the ALG does not send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs, this is a finding.
Fix: F-5202r395936_fix
Configure the ALG to send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-NET-000089-ALG-000055
- Vuln IDs
-
- V-204935
- V-54441
- Rule IDs
-
- SV-204935r395940_rule
- SV-68687
Checks: C-5203r395938_chk
Verify the ALG shuts down by default upon audit failure (unless availability is an overriding concern). If the ALG does not shut down by default upon audit failure (unless availability is an overriding concern), this is a finding.
Fix: F-5203r395939_fix
Configure the ALG to shut down by default upon audit failure (unless availability is an overriding concern).
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-NET-000098-ALG-000056
- Vuln IDs
-
- V-204936
- V-54443
- Rule IDs
-
- SV-204936r395943_rule
- SV-68689
Checks: C-5204r395941_chk
Verify the ALG protects audit information from unauthorized read access. If the ALG does not protect audit information from unauthorized read access, this is a finding.
Fix: F-5204r395942_fix
Configure the ALG to protect audit information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-NET-000099-ALG-000057
- Vuln IDs
-
- V-204937
- V-54445
- Rule IDs
-
- SV-204937r395946_rule
- SV-68691
Checks: C-5205r395944_chk
Verify the ALG protects audit information from unauthorized modification. If the ALG does not protect audit information from unauthorized modification, this is a finding.
Fix: F-5205r395945_fix
Configure the ALG to protect audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-NET-000100-ALG-000058
- Vuln IDs
-
- V-204938
- V-54447
- Rule IDs
-
- SV-204938r395949_rule
- SV-68693
Checks: C-5206r395947_chk
Verify the ALG protects audit information from unauthorized deletion. If the ALG does not protect audit information from unauthorized deletion, this is a finding.
Fix: F-5206r395948_fix
Configure the ALG to protect audit information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-NET-000101-ALG-000059
- Vuln IDs
-
- V-204939
- V-54449
- Rule IDs
-
- SV-204939r395952_rule
- SV-68695
Checks: C-5207r395950_chk
Verify the ALG protects audit tools from unauthorized access. If the ALG does not protect audit tools from unauthorized access, this is a finding.
Fix: F-5207r395951_fix
Configure the ALG to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-NET-000102-ALG-000060
- Vuln IDs
-
- V-204940
- V-54451
- Rule IDs
-
- SV-204940r395955_rule
- SV-68697
Checks: C-5208r395953_chk
Verify the ALG protects audit tools from unauthorized modification. If the ALG does not protect audit tools from unauthorized modification, this is a finding.
Fix: F-5208r395954_fix
Configure the ALG to protect audit tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-NET-000103-ALG-000061
- Vuln IDs
-
- V-204941
- V-54453
- Rule IDs
-
- SV-204941r395958_rule
- SV-68699
Checks: C-5209r395956_chk
Verify the ALG protects audit tools from unauthorized deletion. If the ALG does not protect audit tools from unauthorized deletion, this is a finding.
Fix: F-5209r395957_fix
Configure the ALG to protect audit tools from unauthorized deletion.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-ALG-000085
- Vuln IDs
-
- V-204942
- V-54499
- Rule IDs
-
- SV-204942r395961_rule
- SV-68745
Checks: C-5210r395959_chk
Review the ALG configuration to determine if services or functions not required for operation, or not related to ALG functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If unnecessary services and functions are enabled on the ALG, this is a finding.
Fix: F-5210r395960_fix
Remove unneeded services and functions from the ALG. Removal is recommended since the service or function may be inadvertently enabled. However, if removal is not possible, disable the service or function.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-ALG-000086
- Vuln IDs
-
- V-204943
- V-54501
- Rule IDs
-
- SV-204943r395964_rule
- SV-68747
Checks: C-5211r395962_chk
Review the ALG configuration to determine if application proxies are installed which are not related to the purpose of the gateway. If the ALG has unrelated or unneeded application proxy services installed, this is a finding.
Fix: F-5211r395963_fix
Remove application proxy services that are unrelated or unneeded to the primary function of the ALG.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-ALG-000087
- Vuln IDs
-
- V-204944
- V-54503
- Rule IDs
-
- SV-204944r395967_rule
- SV-68749
Checks: C-5212r395965_chk
View the configuration and vendor documentation of the ALG application to find the minimum ports, protocols, and services which are required for operation of the ALG. Compare enabled ports, protocols, and/or services with the Ports, Protocol, and Service Management (PPSM) and IAVM requirements. If ports, protocols, and/or services are not disabled or restricted as required by the PPSM, this is a finding.
Fix: F-5212r395966_fix
Disable ports, protocols, and/or services not required for operation of the ALG application.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-NET-000138-ALG-000063
- Vuln IDs
-
- V-204945
- V-54509
- Rule IDs
-
- SV-204945r395970_rule
- SV-68755
Checks: C-5213r395968_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users). If the ALG does not uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
Fix: F-5213r395969_fix
If user access control intermediary services are provided, configure the ALG to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-NET-000138-ALG-000088
- Vuln IDs
-
- V-204946
- V-54507
- Rule IDs
-
- SV-204946r395973_rule
- SV-68753
Checks: C-5214r395971_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG is configured with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges. If the ALG is not configured with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges, this is a finding.
Fix: F-5214r395972_fix
If user access control intermediary services are provided, configure the ALG with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-NET-000138-ALG-000089
- Vuln IDs
-
- V-204947
- V-54511
- Rule IDs
-
- SV-204947r395976_rule
- SV-68757
Checks: C-5215r395974_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to use a specific authentication server(s). If the ALG does not restrict user authentication traffic to a specific authentication server(s), this is a finding.
Fix: F-5215r395975_fix
If user authentication intermediary services are provided, configure the ALG to use a specific authentication server(s).
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-NET-000140-ALG-000094
- Vuln IDs
-
- V-204948
- V-54521
- Rule IDs
-
- SV-204948r954210_rule
- SV-68767
Checks: C-5216r395977_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to use multifactor authentication for network access to non-privileged accounts. If the ALG does not use multifactor authentication for network access to non-privileged accounts, this is a finding.
Fix: F-5216r395978_fix
If user authentication intermediary services are provided, configure the ALG to use multifactor authentication for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-NET-000147-ALG-000095
- Vuln IDs
-
- V-204949
- V-54523
- Rule IDs
-
- SV-204949r981631_rule
- SV-68769
Checks: C-5217r981629_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG is configured to implement replay-resistant authentication mechanisms for network access to nonprivileged accounts. If the ALG does not implement replay-resistant authentication mechanisms for network access to nonprivileged accounts, this is a finding.
Fix: F-5217r981630_fix
If user authentication intermediary services are provided, configure the ALG to implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-NET-000164-ALG-000100
- Vuln IDs
-
- V-204950
- V-54531
- Rule IDs
-
- SV-204950r395985_rule
- SV-68777
Checks: C-5218r395983_chk
If the ALG does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS), this is not applicable. Verify the ALG validates certificates used for TLS functions by performing RFC 5280-compliant certification path validation. If the ALG does not validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation, this is a finding.
Fix: F-5218r395984_fix
If intermediary services for TLS are provided, configure the ALG to validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-NET-000166-ALG-000101
- Vuln IDs
-
- V-204951
- V-54533
- Rule IDs
-
- SV-204951r395988_rule
- SV-68779
Checks: C-5219r395986_chk
If the ALG does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the ALG maps the authenticated identity to the user account for PKI-based authentication. If the ALG does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.
Fix: F-5219r395987_fix
If PKI-based user authentication intermediary services are provided, configure the ALG to map the authenticated identities to the user account.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- SRG-NET-000169-ALG-000102
- Vuln IDs
-
- V-204952
- V-54535
- Rule IDs
-
- SV-204952r395991_rule
- SV-68781
Checks: C-5220r395989_chk
If intermediary services are not provided to non-organizational users, this is not applicable. If the ALG does not provide user authentication intermediary services, this is not applicable. Review the ALG authentication functions. Verify identification and authentication is required for non-organizational users. Examine the policy filters to verify a rule exists to deny access to unauthenticated, non-organizational users. If the ALG does not uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users, this is a finding.
Fix: F-5220r395990_fix
If user authentication intermediary services are provided, configure ALG to uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-NET-000192-ALG-000121
- Vuln IDs
-
- V-204953
- V-54635
- Rule IDs
-
- SV-204953r395994_rule
- SV-68881
Checks: C-5221r395992_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG is configured to block outbound traffic containing known and unknown DoS attacks. If the ALG does not block outbound traffic containing known and unknown DoS attacks, this is a finding.
Fix: F-5221r395993_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to block outbound traffic containing known and unknown DoS attacks.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001109
- Version
- SRG-NET-000202-ALG-000124
- Vuln IDs
-
- V-204954
- V-54641
- Rule IDs
-
- SV-204954r395997_rule
- SV-68887
Checks: C-5222r395995_chk
Verify the ALG denies network communications traffic by default and allows network communications traffic by exception on both inbound and outbound interfaces. If the ALG does not deny network communications traffic by default and allow network communications traffic by exception on both inbound and outbound interfaces, this is a finding.
Fix: F-5222r395996_fix
Configure the ALG to deny network communications traffic by default and allow network communications traffic by exception on both inbound and outbound interfaces.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SRG-NET-000213-ALG-000107
- Vuln IDs
-
- V-204955
- V-54545
- Rule IDs
-
- SV-204955r971530_rule
- SV-68791
Checks: C-5223r395998_chk
Verify the ALG terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity. If the ALG does not terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, this is a finding.
Fix: F-5223r395999_fix
Configure ALG to terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-NET-000228-ALG-000108
- Vuln IDs
-
- V-204956
- V-54609
- Rule IDs
-
- SV-204956r396003_rule
- SV-68855
Checks: C-5224r396001_chk
Verify the ALG detects, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment. If the ALG does not detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment, this is a finding.
Fix: F-5224r396002_fix
Configure the ALG to detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-NET-000230-ALG-000113
- Vuln IDs
-
- V-204957
- V-54615
- Rule IDs
-
- SV-204957r396006_rule
- SV-68861
Checks: C-5225r396004_chk
Verify the ALG protects the authenticity of communications sessions. If the ALG does not protect the authenticity of communications sessions, this is a finding.
Fix: F-5225r396005_fix
Configure ALG to protect the authenticity of communications sessions.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-NET-000231-ALG-000114
- Vuln IDs
-
- V-204958
- V-54617
- Rule IDs
-
- SV-204958r396009_rule
- SV-68863
Checks: C-5226r396007_chk
Verify the ALG invalidates session identifiers upon user logout or other session termination. If the ALG does not invalidate session identifiers upon user logout or other session termination, this is a finding.
Fix: F-5226r396008_fix
Configure ALG to invalidate session identifiers upon user logout or other session termination.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-NET-000233-ALG-000115
- Vuln IDs
-
- V-204959
- V-54619
- Rule IDs
-
- SV-204959r396012_rule
- SV-68865
Checks: C-5227r396010_chk
Verify the ALG recognizes only system-generated session identifiers. If the ALG does not recognize only system-generated session identifiers, this is a finding.
Fix: F-5227r396011_fix
Configure ALG to recognize only system-generated session identifiers.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-NET-000234-ALG-000116
- Vuln IDs
-
- V-204960
- V-54621
- Rule IDs
-
- SV-204960r396015_rule
- SV-68867
Checks: C-5228r396013_chk
Verify the ALG generates unique session identifiers using a FIPS 140-2 approved random number generator. If the ALG does not generate unique session identifiers using a FIPS 140-2 approved random number generator, this is a finding.
Fix: F-5228r396014_fix
Configure ALG to generate unique session identifiers using a FIPS 140-2 approved random number generator.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-ALG-000118
- Vuln IDs
-
- V-204961
- V-54773
- Rule IDs
-
- SV-204961r396018_rule
- SV-69019
Checks: C-5229r396016_chk
Verify the ALG function fails to a secure state upon failure of initialization, shutdown, or abort actions. If the ALG function does not fail to a secure state upon failure of initialization, shutdown, or abort actions, this is a finding.
Fix: F-5229r396017_fix
Configure the ALG to fail to a secure state upon failure of initialization, shutdown, or abort actions.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-NET-000236-ALG-000119
- Vuln IDs
-
- V-204962
- V-54625
- Rule IDs
-
- SV-204962r396021_rule
- SV-68871
Checks: C-5230r396019_chk
Verify the ALG, in the event of a system failure, saves diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted. If the ALG does not save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted, this is a finding.
Fix: F-5230r396020_fix
Configure the ALG, in the event of a system failure, to save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
- RMF Control
- Severity
- M
- CCI
- CCI-004965
- Version
- SRG-NET-000246-ALG-000132
- Vuln IDs
-
- V-204963
- V-54655
- Rule IDs
-
- SV-204963r981632_rule
- SV-68901
Checks: C-5231r396022_chk
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG updates malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures. If the ALG does not update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures, this is a finding.
Fix: F-5231r396023_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- SRG-NET-000248-ALG-000133
- Vuln IDs
-
- V-204964
- V-54657
- Rule IDs
-
- SV-204964r981633_rule
- SV-68903
Checks: C-5232r396025_chk
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG performs real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed. If the ALG does not perform real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed, this is a finding.
Fix: F-5232r396026_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to perform real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-ALG-000134
- Vuln IDs
-
- V-204965
- V-54659
- Rule IDs
-
- SV-204965r396030_rule
- SV-68905
Checks: C-5233r396028_chk
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG blocks malicious code upon detection. If the ALG does not block malicious code when detected, this is a finding.
Fix: F-5233r396029_fix
If the ALG performs content filtering as part of its traffic management functionality, configure the ALG to block malicious code upon detection.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-ALG-000145
- Vuln IDs
-
- V-204966
- V-54661
- Rule IDs
-
- SV-204966r396033_rule
- SV-68907
Checks: C-5234r396031_chk
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG blocks and either deletes or quarantines malicious code upon detection. If the ALG does not block and either delete or quarantine malicious code upon detection, this is a finding.
Fix: F-5234r396032_fix
If content filtering is provided as part of the traffic management functionality, configure the ALG to block and either delete or quarantine malicious code when it is detected.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-ALG-000146
- Vuln IDs
-
- V-204967
- V-54663
- Rule IDs
-
- SV-204967r396036_rule
- SV-68909
Checks: C-5235r396034_chk
If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable. Verify the ALG sends an immediate (within seconds) alert to the system administrator, at a minimum, when malicious code is detected. If the ALG does not send an immediate (within seconds) alert to the system administrator, at a minimum, when malicious code is detected, this is a finding.
Fix: F-5235r396035_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to send an immediate (within seconds) alert to the system administrator, at a minimum, when malicious code is detected.
- RMF Control
- Severity
- M
- CCI
- CCI-004964
- Version
- SRG-NET-000251-ALG-000131
- Vuln IDs
-
- V-204968
- V-54653
- Rule IDs
-
- SV-204968r981634_rule
- SV-68899
Checks: C-5236r396037_chk
If the ALG does not perform content filtering as part of its traffic management functionality, this is not applicable. Verify the ALG automatically updates malicious code protection mechanisms. If the ALG does not automatically update malicious code protection mechanisms, this is a finding.
Fix: F-5236r396038_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to automatically update malicious code protection mechanisms.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-NET-000273-ALG-000129
- Vuln IDs
-
- V-204969
- V-54649
- Rule IDs
-
- SV-204969r396042_rule
- SV-68895
Checks: C-5237r396040_chk
Verify the ALG generates error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries. If the ALG does not generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries, this is a finding.
Fix: F-5237r396041_fix
Configure the ALG to generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000030
- Version
- SRG-NET-000280-ALG-000080
- Vuln IDs
-
- V-204970
- V-54489
- Rule IDs
-
- SV-204970r987741_rule
- SV-68735
Checks: C-5238r396043_chk
If the ALG is not part of a CDS, this is not applicable. Verify that policy filters exist that enforce traffic flow inbound and outbound across the controlled security boundary based on organization-defined metadata. If the ALG does not control traffic based on organization-defined metadata, this is a finding.
Fix: F-5238r396044_fix
If the ALG is part of a CDS, configure inbound or outbound policy filters to enforce traffic flow across the controlled security boundary based on organization-defined metadata.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000030
- Version
- SRG-NET-000280-ALG-000081
- Vuln IDs
-
- V-204971
- V-54491
- Rule IDs
-
- SV-204971r987741_rule
- SV-68737
Checks: C-5239r396046_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to block the transfer of data with malformed security attribute metadata structures. If the ALG is not configured to block the transfer of data with malformed security attribute metadata structures, this is a finding.
Fix: F-5239r396047_fix
If the ALG is part of a CDS, configure the ALG to block the transfer of data with malformed security attribute metadata structures.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000219
- Version
- SRG-NET-000282-ALG-000071
- Vuln IDs
-
- V-204972
- V-54471
- Rule IDs
-
- SV-204972r987742_rule
- SV-68717
Checks: C-5240r396049_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG, when transferring information between different security domains, is configured to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains. If the ALG is not configured to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains, this is a finding.
Fix: F-5240r396050_fix
If the ALG is part of a CDS, configure the ALG to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000283-ALG-000072
- Vuln IDs
-
- V-204973
- V-54473
- Rule IDs
-
- SV-204973r987743_rule
- SV-68719
Checks: C-5241r396052_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG, when transferring information between different security domains, implements organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content. If the ALG when transferring information between different security domains does not implement organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content, this is a finding.
Fix: F-5241r396053_fix
If the ALG is part of a CDS, configure the ALG to implement organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content when transferring information between different security domains.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000284-ALG-000073
- Vuln IDs
-
- V-204974
- V-54475
- Rule IDs
-
- SV-204974r987744_rule
- SV-68721
Checks: C-5242r396055_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG when transferring information between different security domains, is configured to examine the information for the presence of organization-defined unsanctioned information. If the ALG is not configured to examine the information for the presence of organization-defined unsanctioned information when transferring information between different security domains, this is a finding.
Fix: F-5242r396056_fix
If the ALG is part of a CDS, configure the ALG to examine the information for the presence of organization-defined unsanctioned information when transferring information between different security domains.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000285-ALG-000074
- Vuln IDs
-
- V-204975
- V-54477
- Rule IDs
-
- SV-204975r987745_rule
- SV-68723
Checks: C-5243r396058_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG prohibits the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains. If the ALG is not configured to prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains, this is a finding.
Fix: F-5243r396059_fix
If the ALG is part of a CDS, configure the ALG to prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- SRG-NET-000288-ALG-000109
- Vuln IDs
-
- V-204976
- V-54611
- Rule IDs
-
- SV-204976r396063_rule
- SV-68857
Checks: C-5244r396061_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG blocks or restricts detected prohibited mobile code. If the ALG does not block or restrict detected prohibited mobile code, this is a finding.
Fix: F-5244r396062_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to block or restrict detected prohibited mobile code.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- SRG-NET-000289-ALG-000110
- Vuln IDs
-
- V-204977
- V-54613
- Rule IDs
-
- SV-204977r396066_rule
- SV-68859
Checks: C-5245r396064_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents the download of prohibited mobile code. If the ALG does not prevent the download of prohibited mobile code, this is a finding.
Fix: F-5245r396065_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent the download of prohibited mobile code.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-NET-000313-ALG-000010
- Vuln IDs
-
- V-204978
- V-54355
- Rule IDs
-
- SV-204978r831355_rule
- SV-68601
Checks: C-5246r396067_chk
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG is configured to control remote access methods. If the ALG does not control remote access methods, this is a finding.
Fix: F-5246r396068_fix
If intermediary services for remote access communications traffic are provided, configure the ALG to control remote access methods.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-NET-000314-ALG-000013
- Vuln IDs
-
- V-204979
- V-54363
- Rule IDs
-
- SV-204979r831356_rule
- SV-68609
Checks: C-5247r396070_chk
If the ALG does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS and webmail), this is not applicable. Verify the ALG provides the capability to immediately disconnect or disable remote access to the information system. If the ALG does not provide the capability to immediately disconnect or disable remote access to the information system, this is a finding.
Fix: F-5247r396071_fix
If intermediary services for remote access communications traffic are provided, configure the ALG to provide the capability to immediately disconnect or disable remote access to the information system.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-ALG-000014
- Vuln IDs
-
- V-204980
- V-54365
- Rule IDs
-
- SV-204980r831357_rule
- SV-68611
Checks: C-5248r396073_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the ALG does not prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
Fix: F-5248r396074_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-ALG-000151
- Vuln IDs
-
- V-204981
- V-54367
- Rule IDs
-
- SV-204981r831358_rule
- SV-68613
Checks: C-5249r396076_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents code injection attacks from being launched against application objects including, at a minimum, application URLs and application code. If the ALG does not prevent code injection attacks from being launched against application objects including, at a minimum, application URLs and application code, this is a finding.
Fix: F-5249r396077_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent code injection attacks from being launched against application objects including, at a minimum, application URLs and application code.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-ALG-000152
- Vuln IDs
-
- V-204982
- V-54369
- Rule IDs
-
- SV-204982r831359_rule
- SV-68615
Checks: C-5250r396079_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG prevents SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the ALG does not prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
Fix: F-5250r396080_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-ALG-000015
- Vuln IDs
-
- V-204983
- V-54371
- Rule IDs
-
- SV-204983r831360_rule
- SV-68617
Checks: C-5251r396082_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the ALG does not detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
Fix: F-5251r396083_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-ALG-000020
- Vuln IDs
-
- V-204984
- V-54771
- Rule IDs
-
- SV-204984r831361_rule
- SV-69017
Checks: C-5252r396325_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the ALG does not detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
Fix: F-5252r396326_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-ALG-000153
- Vuln IDs
-
- V-204985
- V-54373
- Rule IDs
-
- SV-204985r831362_rule
- SV-68619
Checks: C-5253r396328_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects code injection attacks from being launched against application objects including, at a minimum, application URLs and application code. If the ALG does not detect code injection attacks from being launched against application objects including, at a minimum, application URLs and application code, this is a finding.
Fix: F-5253r396329_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect code injection attacks from being launched against application objects including, at a minimum, application URLs and application code.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000323-ALG-000067
- Vuln IDs
-
- V-204986
- V-54463
- Rule IDs
-
- SV-204986r987751_rule
- SV-68709
Checks: C-5254r396331_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG uses source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions. If the ALG is not configured to use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions, this is a finding.
Fix: F-5254r396332_fix
If the ALG is part of a CDS, configure the ALG to use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000324-ALG-000070
- Vuln IDs
-
- V-204987
- V-54469
- Rule IDs
-
- SV-204987r987752_rule
- SV-68715
Checks: C-5255r396334_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to use organization-defined data type identifiers to validate data essential for information flow decisions. If the ALG is not configured to use organization-defined data type identifiers to validate data essential for information flow decisions, this is a finding.
Fix: F-5255r396335_fix
If the ALG is part of a CDS, configure the ALG to use organization-defined data type identifiers to validate data essential for information flow decisions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000325-ALG-000075
- Vuln IDs
-
- V-204988
- V-54479
- Rule IDs
-
- SV-204988r987753_rule
- SV-68725
Checks: C-5256r396337_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG uniquely identifies and authenticates source by organization, system, application, and/or individual for information transfer. If the ALG is not configured to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer, this is a finding.
Fix: F-5256r396338_fix
If the ALG is part of a CDS, configure the ALG to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000326-ALG-000076
- Vuln IDs
-
- V-204989
- V-54481
- Rule IDs
-
- SV-204989r987754_rule
- SV-68727
Checks: C-5257r396340_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG uniquely identifies and authenticates destination by organization, system, application, and/or individual for information transfer. If the ALG is not configured to uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer, this is a finding.
Fix: F-5257r396341_fix
If the ALG is part of a CDS, configure the ALG to uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000328-ALG-000078
- Vuln IDs
-
- V-204991
- V-54485
- Rule IDs
-
- SV-204991r987756_rule
- SV-68731
Checks: C-5259r396346_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to apply the same security policy filtering to metadata as it applies to data payloads when transferring information between different security domains. If the ALG is not configured to apply the same security policy filtering to metadata as it applies to data payloads when transferring information between different security domains, this is a finding.
Fix: F-5259r396347_fix
If the ALG is part of a CDS, configure the ALG to apply the same security policy filtering to metadata as it applies to data payloads when transferring information between different security domains.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000329-ALG-000084
- Vuln IDs
-
- V-204992
- V-54497
- Rule IDs
-
- SV-204992r987757_rule
- SV-68743
Checks: C-5260r396349_chk
If the ALG is not part of a CDS, this is not applicable. Verify the ALG is configured to enforce the use of human reviews for organization-defined information flows under organization-defined conditions. If the ALG is not configured to enforce the use of human reviews for organization-defined information flows under organization-defined conditions, this is a finding.
Fix: F-5260r396350_fix
If the ALG is part of a CDS, configure the ALG to enforce the use of human reviews for organization-defined information flows under organization-defined conditions.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001919
- Version
- SRG-NET-000331-ALG-000041
- Vuln IDs
-
- V-204993
- V-54767
- Rule IDs
-
- SV-204993r831370_rule
- SV-69013
Checks: C-5261r396352_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG provides the capability for authorized users to select a user session to capture or view. If the ALG does not provide the capability for authorized users to select a user session to capture or view, this is a finding.
Fix: F-5261r396353_fix
If user access control intermediary services are provided, configure the ALG to provide the capability for authorized users to select a user session to capture or view.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000334-ALG-000050
- Vuln IDs
-
- V-204995
- V-54431
- Rule IDs
-
- SV-204995r831372_rule
- SV-68677
Checks: C-5263r396358_chk
Verify the ALG off-loads audit records onto a centralized log server. If the ALG does not off-load audit records onto a centralized log server, this is a finding.
Fix: F-5263r396359_fix
Configure the ALG to off-load audit records onto a centralized log server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-NET-000335-ALG-000053
- Vuln IDs
-
- V-204996
- V-54437
- Rule IDs
-
- SV-204996r831373_rule
- SV-68683
Checks: C-5264r396361_chk
Verify the ALG provides an immediate real-time alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server. If the ALG does not provide an immediate real-time alert to, at a minimum, the SCA and ISSO, of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server, this is a finding.
Fix: F-5264r396362_fix
Configure the ALG to provide an immediate real-time alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-NET-000339-ALG-000090
- Vuln IDs
-
- V-204998
- V-54513
- Rule IDs
-
- SV-204998r981642_rule
- SV-68759
Checks: C-5266r981640_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG implements multifactor authentication for remote access to nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the ALG does not implement multifactor authentication for remote access to nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-5266r981641_fix
If user authentication intermediary services are provided, configure the ALG to implement multifactor authentication for remote access to nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-NET-000340-ALG-000091
- Vuln IDs
-
- V-204999
- V-54515
- Rule IDs
-
- SV-204999r981643_rule
- SV-68761
Checks: C-5267r396370_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the ALG does not implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-5267r396371_fix
If user authentication intermediary services are provided, configure the ALG to implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-NET-000344-ALG-000098
- Vuln IDs
-
- V-205000
- V-54527
- Rule IDs
-
- SV-205000r831377_rule
- SV-68773
Checks: C-5268r396373_chk
Verify the ALG prohibits the use of cached authenticators after an organization-defined time period. If the ALG does not prohibit the use of cached authenticators after an organization-defined time period, this is a finding.
Fix: F-5268r396374_fix
Configure the ALG to prohibit the use of cached authenticators after an organization-defined time period.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-NET-000345-ALG-000099
- Vuln IDs
-
- V-205001
- V-54529
- Rule IDs
-
- SV-205001r981644_rule
- SV-68775
Checks: C-5269r396376_chk
If the ALG does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the ALG implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If the ALG does not implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network, this is a finding.
Fix: F-5269r396377_fix
If PKI-based user authentication intermediary services are provided, configure the ALG to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- Severity
- M
- CCI
- CCI-004085
- Version
- SRG-NET-000349-ALG-000106
- Vuln IDs
-
- V-205002
- V-54543
- Rule IDs
-
- SV-205002r981646_rule
- SV-68789
Checks: C-5270r981645_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG conforms to FICAM-issued profiles. If the ALG does not conform to FICAM-issued profiles, this is a finding.
Fix: F-5270r396380_fix
If user authentication intermediary services are provided, configure ALG to conform to FICAM-issued profiles.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-NET-000355-ALG-000117
- Vuln IDs
-
- V-205003
- V-54623
- Rule IDs
-
- SV-205003r831380_rule
- SV-68869
Checks: C-5271r396382_chk
If the ALG does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the ALG only accepts end entity certificates issued by DoD PKI or DoD-approved PKI CAs for the establishment of protected sessions. If the ALG accepts non-DoD approved PKI end entity certificates, this is a finding.
Fix: F-5271r396383_fix
If PKI-based user authentication intermediary services are provided, configure the ALG to only accept end entity certificates issued by DoD PKI or DoD-approved PKI CAs for the establishment of protected sessions.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-ALG-000112
- Vuln IDs
-
- V-205004
- V-54629
- Rule IDs
-
- SV-205004r831381_rule
- SV-68875
Checks: C-5272r396385_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG protects against or limits the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis. If the ALG does not protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis, this is a finding.
Fix: F-5272r396386_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-ALG-000120
- Vuln IDs
-
- V-205005
- V-54627
- Rule IDs
-
- SV-205005r831382_rule
- SV-68873
Checks: C-5273r396388_chk
Verify the ALG implements load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks. If the device does not implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks, this is a finding.
Fix: F-5273r396389_fix
Configure the ALG to implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-ALG-000126
- Vuln IDs
-
- V-205006
- V-54633
- Rule IDs
-
- SV-205006r831383_rule
- SV-68879
Checks: C-5274r396391_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG protects against or limits the effects of known types of DoS attacks by employing signatures. If the ALG does not protect against or limit the effects of known types of DoS attacks by employing signatures, this is a finding.
Fix: F-5274r396392_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to protect against or limit the effects of known types of DoS attacks by employing signatures.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-ALG-000155
- Vuln IDs
-
- V-205007
- V-54631
- Rule IDs
-
- SV-205007r831384_rule
- SV-68877
Checks: C-5275r396394_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG protects against or limits the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors. If the ALG does not protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors, this is a finding.
Fix: F-5275r396395_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-ALG-000122
- Vuln IDs
-
- V-205008
- V-54637
- Rule IDs
-
- SV-205008r831385_rule
- SV-68883
Checks: C-5276r396397_chk
Verify the ALG only allows incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations. If the ALG allows incoming communications from unauthorized sources routed to unauthorized destinations, this is a finding.
Fix: F-5276r396398_fix
Configure the ALG to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001126
- Version
- SRG-NET-000365-ALG-000123
- Vuln IDs
-
- V-205009
- V-54639
- Rule IDs
-
- SV-205009r396402_rule
- SV-68885
Checks: C-5277r396400_chk
Verify the ALG fails securely in the event of an operational failure. If the ALG does not fail securely in the event of an operational failure, this is a finding.
Fix: F-5277r396401_fix
Configure the ALG to fail securely in the event of an operational failure.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002400
- Version
- SRG-NET-000370-ALG-000125
- Vuln IDs
-
- V-205010
- V-54643
- Rule IDs
-
- SV-205010r831386_rule
- SV-68889
Checks: C-5278r396403_chk
Verify the ALG identifies and logs internal users associated with denied outgoing communications traffic posing a threat to external information systems. If the ALG does not identify and log internal users associated with denied outgoing communications traffic posing a threat to external information systems, this is a finding.
Fix: F-5278r396404_fix
Configure the ALG to identify and log internal users associated with denied outgoing communications traffic posing a threat to external information systems.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-NET-000380-ALG-000128
- Vuln IDs
-
- V-205011
- V-54647
- Rule IDs
-
- SV-205011r831387_rule
- SV-68893
Checks: C-5279r396406_chk
Verify the ALG behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If the ALG does not behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received, this is a finding.
Fix: F-5279r396407_fix
Configure the ALG to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002656
- Version
- SRG-NET-000383-ALG-000135
- Vuln IDs
-
- V-205012
- V-54665
- Rule IDs
-
- SV-205012r831388_rule
- SV-68911
Checks: C-5280r396409_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG integrates with a system-wide intrusion detection system. If the ALG does not integrate with a system-wide intrusion detection system, this is a finding.
Fix: F-5280r396410_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to integrate with a system-wide intrusion detection system.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002683
- Version
- SRG-NET-000384-ALG-000136
- Vuln IDs
-
- V-205013
- V-54667
- Rule IDs
-
- SV-205013r831389_rule
- SV-68913
Checks: C-5281r396412_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG detects use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum. If the ALG does not detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum, this is a finding.
Fix: F-5281r396413_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002684
- Version
- SRG-NET-000385-ALG-000137
- Vuln IDs
-
- V-205014
- V-54669
- Rule IDs
-
- SV-205014r831390_rule
- SV-68915
Checks: C-5282r396415_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates a log record when unauthorized network services are detected. If the ALG does not generate a log record when unauthorized network services are detected, this is a finding.
Fix: F-5282r396416_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate a log record when unauthorized network services are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002684
- Version
- SRG-NET-000385-ALG-000138
- Vuln IDs
-
- V-205015
- V-54671
- Rule IDs
-
- SV-205015r831391_rule
- SV-68917
Checks: C-5283r396418_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected, this is a finding.
Fix: F-5283r396419_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002661
- Version
- SRG-NET-000390-ALG-000139
- Vuln IDs
-
- V-205016
- V-54673
- Rule IDs
-
- SV-205016r831392_rule
- SV-68919
Checks: C-5284r396421_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG continuously monitors inbound communications traffic for unusual or unauthorized activities or conditions. If the ALG does not continuously monitor inbound communications traffic for unusual or unauthorized activities or conditions, this is a finding.
Fix: F-5284r396422_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to continuously monitor inbound communications traffic for unusual or unauthorized activities or conditions.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002662
- Version
- SRG-NET-000391-ALG-000140
- Vuln IDs
-
- V-205017
- V-54675
- Rule IDs
-
- SV-205017r831393_rule
- SV-68921
Checks: C-5285r396424_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG continuously monitors outbound communications traffic for unusual or unauthorized activities or conditions. If the ALG does not continuously monitor outbound communications traffic for unusual or unauthorized activities or conditions, this is a finding.
Fix: F-5285r396425_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to continuously monitor outbound communications traffic for unusual or unauthorized activities or conditions.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000141
- Vuln IDs
-
- V-205018
- V-54677
- Rule IDs
-
- SV-205018r971533_rule
- SV-68923
Checks: C-5286r396427_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG sends an alert to, at a minimum, the ISSO and ISSM when detection events occur. If the ALG does not send an alert to, at a minimum, the ISSO and ISSM when detection events from real-time monitoring of communications traffic occur, this is a finding.
Fix: F-5286r396428_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to send an alert to, at a minimum, the ISSO and ISSM when detection events occur.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000142
- Vuln IDs
-
- V-205019
- V-54679
- Rule IDs
-
- SV-205019r971533_rule
- SV-68925
Checks: C-5287r396430_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected, this is a finding.
Fix: F-5287r396431_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000143
- Vuln IDs
-
- V-205020
- V-54681
- Rule IDs
-
- SV-205020r971533_rule
- SV-68927
Checks: C-5288r396433_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected, this is a finding.
Fix: F-5288r396434_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000147
- Vuln IDs
-
- V-205021
- V-54683
- Rule IDs
-
- SV-205021r971533_rule
- SV-68929
Checks: C-5289r396436_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected, this is a finding.
Fix: F-5289r396437_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000148
- Vuln IDs
-
- V-205022
- V-54685
- Rule IDs
-
- SV-205022r971533_rule
- SV-68931
Checks: C-5290r396439_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected, this is a finding.
Fix: F-5290r396440_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-ALG-000149
- Vuln IDs
-
- V-205023
- V-54687
- Rule IDs
-
- SV-205023r971533_rule
- SV-68933
Checks: C-5291r396442_chk
If the ALG does not perform content filtering as part of the traffic management functions, this is not applicable. Verify the ALG generates an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected. If the ALG does not generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected, this is a finding.
Fix: F-5291r396443_fix
If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- SRG-NET-000393-ALG-000144
- Vuln IDs
-
- V-205024
- V-54689
- Rule IDs
-
- SV-205024r396447_rule
- SV-68935
Checks: C-5292r396445_chk
If the ALG does not provide spam protection functions, this is not applicable. Verify the ALG automatically updates spam protection mechanisms. If the ALG does not automatically update spam protection mechanisms, this is a finding.
Fix: F-5292r396446_fix
If the ALG provides spam protection functions, configure the ALG to automatically update spam protection mechanisms.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-NET-000400-ALG-000097
- Vuln IDs
-
- V-205026
- V-54525
- Rule IDs
-
- SV-205026r396453_rule
- SV-68771
Checks: C-5294r396451_chk
If the ALG does not provide user authentication intermediary services, this is not applicable. Verify the ALG transmits only encrypted representations of passwords. If the ALG does not transmit only encrypted representations of passwords, this is a finding.
Fix: F-5294r396452_fix
If user authentication intermediary services are provided, configure the ALG to transmit only encrypted representations of passwords.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-NET-000401-ALG-000127
- Vuln IDs
-
- V-205027
- V-54645
- Rule IDs
-
- SV-205027r396456_rule
- SV-68891
Checks: C-5295r396454_chk
Verify the ALG checks the validity of all data inputs except those specifically identified by the organization. If the ALG does not check the validity of all data inputs except those specifically identified by the organization, this is a finding.
Fix: F-5295r396455_fix
Configure the ALG to check the validity of all data inputs except those specifically identified by the organization.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-NET-000402-ALG-000130
- Vuln IDs
-
- V-205028
- V-54651
- Rule IDs
-
- SV-205028r396459_rule
- SV-68897
Checks: C-5296r396457_chk
Verify the ALG reveals error messages only to the ISSO, ISSM, and SCA. If the ALG does not reveal error messages only to the ISSO, ISSM, and SCA, this is a finding.
Fix: F-5296r396458_fix
Configure the ALG to reveal error messages only to the ISSO, ISSM, and SCA.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000492-ALG-000027
- Vuln IDs
-
- V-205029
- V-54397
- Rule IDs
-
- SV-205029r396462_rule
- SV-68643
Checks: C-5297r396460_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to access security objects occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access security objects occur, this is a finding.
Fix: F-5297r396461_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to access security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000493-ALG-000028
- Vuln IDs
-
- V-205030
- V-54399
- Rule IDs
-
- SV-205030r396465_rule
- SV-68645
Checks: C-5298r396463_chk
If the ALG is not part of the CDS, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to access security levels occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access security levels occur, this is a finding.
Fix: F-5298r396464_fix
If the ALG is part of the CDS, configure the ALG to generate audit records when successful/unsuccessful attempts to access security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000494-ALG-000029
- Vuln IDs
-
- V-205031
- V-54401
- Rule IDs
-
- SV-205031r396468_rule
- SV-68647
Checks: C-5299r396466_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur, this is a finding.
Fix: F-5299r396467_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000495-ALG-000030
- Vuln IDs
-
- V-205032
- V-54403
- Rule IDs
-
- SV-205032r396471_rule
- SV-68649
Checks: C-5300r396469_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to modify privileges occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify privileges occur, this is a finding.
Fix: F-5300r396470_fix
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful attempts to modify privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000496-ALG-000031
- Vuln IDs
-
- V-205033
- V-54405
- Rule IDs
-
- SV-205033r396474_rule
- SV-68651
Checks: C-5301r396472_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to modify security objects occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify security objects occur, this is a finding.
Fix: F-5301r396473_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to modify security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000497-ALG-000032
- Vuln IDs
-
- V-205034
- V-54407
- Rule IDs
-
- SV-205034r396477_rule
- SV-68653
Checks: C-5302r396475_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to modify security levels occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify security levels occur, this is a finding.
Fix: F-5302r396476_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to modify security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000498-ALG-000033
- Vuln IDs
-
- V-205035
- V-54409
- Rule IDs
-
- SV-205035r396480_rule
- SV-68655
Checks: C-5303r396478_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur. If the ALG does not generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur, this is a finding.
Fix: F-5303r396479_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000499-ALG-000034
- Vuln IDs
-
- V-205036
- V-54411
- Rule IDs
-
- SV-205036r396483_rule
- SV-68657
Checks: C-5304r396481_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to delete privileges occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete privileges occur, this is a finding.
Fix: F-5304r396482_fix
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful attempts to delete privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000500-ALG-000035
- Vuln IDs
-
- V-205037
- V-54413
- Rule IDs
-
- SV-205037r396486_rule
- SV-68659
Checks: C-5305r396484_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to delete security levels occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete security levels occur, this is a finding.
Fix: F-5305r396485_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to delete security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000501-ALG-000036
- Vuln IDs
-
- V-205038
- V-54761
- Rule IDs
-
- SV-205038r396489_rule
- SV-69007
Checks: C-5306r396487_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to delete security objects occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete security objects occur, this is a finding.
Fix: F-5306r396488_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to delete security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000502-ALG-000037
- Vuln IDs
-
- V-205039
- V-54763
- Rule IDs
-
- SV-205039r396492_rule
- SV-69009
Checks: C-5307r396490_chk
Verify the ALG generates audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur. If the ALG does not generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur, this is a finding.
Fix: F-5307r396491_fix
Configure the ALG to generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000503-ALG-000038
- Vuln IDs
-
- V-205040
- V-54415
- Rule IDs
-
- SV-205040r396495_rule
- SV-68661
Checks: C-5308r396493_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful logon attempts occur. If the ALG does not generate audit records when successful/unsuccessful logon attempts occur, this is a finding.
Fix: F-5308r396494_fix
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000505-ALG-000039
- Vuln IDs
-
- V-205041
- V-54765
- Rule IDs
-
- SV-205041r396498_rule
- SV-69011
Checks: C-5309r396496_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records showing starting and ending time for user access to the system. If the ALG does not generate audit records showing starting and ending time for user access to the system, this is a finding.
Fix: F-5309r396497_fix
If user access control intermediary services are provided, configure the ALG to generate audit records showing starting and ending time for user access to the system.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-ALG-000025
- Vuln IDs
-
- V-205042
- V-54547
- Rule IDs
-
- SV-205042r831400_rule
- SV-68793
Checks: C-5310r396499_chk
If the ALG does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC), this is not applicable. Verify the ALG implements NIST FIPS-validated cryptography to generate cryptographic hashes. If the ALG does not implement NIST FIPS-validated cryptography to generate cryptographic hashes, this is a finding
Fix: F-5310r396500_fix
If encryption intermediary services are provided, configure the ALG to implement NIST FIPS-validated cryptography to generate cryptographic hashes.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-ALG-000040
- Vuln IDs
-
- V-205043
- V-54549
- Rule IDs
-
- SV-205043r831401_rule
- SV-68795
Checks: C-5311r396502_chk
If the ALG does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC), this is not applicable. Verify the ALG implements NIST FIPS-validated cryptography to implement for digital signatures. If the ALG does not implement NIST FIPS-validated cryptography for digital signatures, this is a finding.
Fix: F-5311r396503_fix
If encryption intermediary services are provided, configure the ALG to implement NIST FIPS-validated cryptography for digital signatures.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-ALG-000111
- Vuln IDs
-
- V-205044
- V-54551
- Rule IDs
-
- SV-205044r831402_rule
- SV-68797
Checks: C-5312r396505_chk
If the ALG does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC), this is not applicable. Verify the ALG uses NIST FIPS-validated cryptography to implement encryption services. If the ALG does not use NIST FIPS-validated cryptography to implement encryption services, this is a finding.
Fix: F-5312r396506_fix
If encryption intermediary services are provided, configure the ALG to use NIST FIPS-validated cryptography to implement encryption services.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000511-ALG-000051
- Vuln IDs
-
- V-205045
- V-54433
- Rule IDs
-
- SV-205045r831403_rule
- SV-68679
Checks: C-5313r396508_chk
Verify the ALG off-loads audit records onto a centralized log server in real time. If the ALG does not off-load onto a centralized log server in real time, this is a finding.
Fix: F-5313r396509_fix
Configure the ALG to off-load onto a centralized log server in real time.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000511-ALG-000052
- Vuln IDs
-
- V-205046
- V-54435
- Rule IDs
-
- SV-205046r831404_rule
- SV-68681
Checks: C-5314r396511_chk
If the ALG is not used as part of a CDS, this is not applicable. Verify the ALG has the capability to implement journaling. If the ALG does not have the capability to implement journaling, this is a finding.
Fix: F-5314r396512_fix
If the ALG is part of a CDS, configure the ALG to provide the capability to implement journaling.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-ALG-000062
- Vuln IDs
-
- V-205047
- V-54455
- Rule IDs
-
- SV-205047r396516_rule
- SV-68701
Checks: C-5315r396514_chk
Verify the ALG is configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices. If the ALG is not configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices, this is a finding.
Fix: F-5315r396515_fix
Configure the ALG to comply with the security configuration settings based on DoD security policy and technology-specific security best practices.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-ALG-000064
- Vuln IDs
-
- V-205048
- V-54457
- Rule IDs
-
- SV-205048r396519_rule
- SV-68703
Checks: C-5316r396517_chk
If the ALG does not provide intermediary/proxy services for SMTP communications traffic, this is not applicable. Verify the ALG inspects inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies. If the ALG does not inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies, this is a finding.
Fix: F-5316r396518_fix
If the ALG provides intermediary/proxy services SMTP communications traffic, configure the ALG to inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-ALG-000065
- Vuln IDs
-
- V-205049
- V-54459
- Rule IDs
-
- SV-205049r396522_rule
- SV-68705
Checks: C-5317r396520_chk
If the ALG does not provide intermediary/proxy services FTP communications traffic, this is not applicable. Verify the ALG inspects inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies. If the ALG does not inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies, this is a finding.
Fix: F-5317r396521_fix
If the ALG provides intermediary/proxy services for FTP communications traffic, configure the ALG to inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-ALG-000066
- Vuln IDs
-
- V-205050
- V-54461
- Rule IDs
-
- SV-205050r396525_rule
- SV-68707
Checks: C-5318r396523_chk
If the ALG does not provide intermediary/proxy services for HTTP communications traffic, this is not applicable. Verify the ALG inspects inbound and outbound HTTP communications traffic for protocol compliance and protocol anomalies. If the ALG does not inspect inbound and outbound HTTP communications traffic for protocol compliance and protocol anomalies, this is a finding.
Fix: F-5318r396524_fix
If the ALG provides intermediary/proxy services for HTTP communications traffic, configure the ALG to inspect inbound and outbound HTTP communications traffic for protocol compliance and protocol anomalies.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000513-ALG-000026
- Vuln IDs
-
- V-205051
- V-54395
- Rule IDs
-
- SV-205051r396528_rule
- SV-68641
Checks: C-5319r396526_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG generates audit records when successful/unsuccessful attempts to access privileges occur. If the ALG does not generate audit records when successful/unsuccessful attempts to access privileges occur, this is a finding.
Fix: F-5319r396527_fix
If user access control intermediary services are provided, configure the ALG to generate audit records when successful/unsuccessful attempts to access privileges occur.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-NET-000514-ALG-000514
- Vuln IDs
-
- V-205052
- V-56191
- Rule IDs
-
- SV-205052r396531_rule
- SV-70445
Checks: C-5320r396529_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG initiates a session lock after a 15-minute period of inactivity. If the ALG does not initiate a session lock after a 15-minute period of inactivity, this is a finding.
Fix: F-5320r396530_fix
If user access control intermediary services are provided, configure the ALG to initiate a session lock after a 15-minute period of inactivity.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-NET-000515-ALG-000515
- Vuln IDs
-
- V-205053
- V-56193
- Rule IDs
-
- SV-205053r981648_rule
- SV-70447
Checks: C-5321r396532_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG provides the capability for users to directly initiate a session lock. If the ALG does not provide the capability for users to directly initiate a session lock, this is a finding.
Fix: F-5321r396533_fix
If user access control intermediary services are provided, configure the ALG to provide the capability for users to directly initiate a session lock.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SRG-NET-000516-ALG-000516
- Vuln IDs
-
- V-205054
- V-56195
- Rule IDs
-
- SV-205054r396537_rule
- SV-70449
Checks: C-5322r396535_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG retains the session lock until the user reestablishes access using established identification and authentication procedures. If the ALG does not retain the session lock until the user reestablishes access using established identification and authentication procedures, this is a finding.
Fix: F-5322r396536_fix
If user access control intermediary services are provided, configure the ALG to retain the session lock until the user reestablishes access using established identification and authentication procedures.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-NET-000517-ALG-000006
- Vuln IDs
-
- V-205055
- V-56197
- Rule IDs
-
- SV-205055r831405_rule
- SV-70451
Checks: C-5323r396538_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG automatically terminates a user session when organization-defined conditions or trigger events that require a session disconnect occur. If the ALG does not automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur, this is a finding.
Fix: F-5323r396539_fix
If user access control intermediary services are provided, configure the ALG to automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-NET-000518-ALG-000007
- Vuln IDs
-
- V-205056
- V-56199
- Rule IDs
-
- SV-205056r831406_rule
- SV-70453
Checks: C-5324r396541_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG provides a logoff capability for user-initiated communications sessions. If the ALG does not provide a logoff capability for user-initiated communications sessions, this is a finding.
Fix: F-5324r396542_fix
If user access control intermediary services are provided, configure the ALG to provide a logoff capability for user-initiated communications sessions.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-NET-000519-ALG-000008
- Vuln IDs
-
- V-205057
- V-56201
- Rule IDs
-
- SV-205057r831407_rule
- SV-70455
Checks: C-5325r396544_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG displays an explicit logoff message to users indicating the reliable termination of authenticated communications sessions. If the ALG does not display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions, this is a finding.
Fix: F-5325r396545_fix
If user access control intermediary services are provided, configure the ALG to display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SRG-NET-000521-ALG-000002
- Vuln IDs
-
- V-205058
- V-56189
- Rule IDs
-
- SV-205058r396549_rule
- SV-70443
Checks: C-5326r396547_chk
If the ALG does not provide user access control intermediary services, this is not applicable. Verify the ALG conceals, via the session lock, information previously visible on the display with a publicly viewable image. If the ALG does not conceal, via the session lock, information previously visible on the display with a publicly viewable image, this is a finding.
Fix: F-5326r396548_fix
If user access control intermediary services are provided, configure the ALG to conceal, via the session lock, information previously visible on the display with a publicly viewable image.
- RMF Control
- Severity
- M
- CCI
- CCI-003928
- Version
- SRG-NET-000700-ALG-000100
- Vuln IDs
-
- V-263540
- Rule IDs
-
- SV-263540r982391_rule
Checks: C-67440r982390_chk
Verify the ALG is configured to prevent or restrict changes to the configuration of the system under organization-defined circumstances. If the ALG is not configured to prevent or restrict changes to the configuration of the system under organization-defined circumstances, this is a finding.
Fix: F-67348r981650_fix
Configure the ALG to prevent or restrict changes to the configuration of the system under organization-defined circumstances.
- RMF Control
- Severity
- M
- CCI
- CCI-004866
- Version
- SRG-NET-000705-ALG-000110
- Vuln IDs
-
- V-263541
- Rule IDs
-
- SV-263541r981654_rule
Checks: C-67441r981652_chk
Verify the ALG is configured to employ organization-defined controls by type of DoS to achieve the DoS objective. If the ALG is not configured to employ organization-defined controls by type of DoS to achieve the DoS objective, this is a finding.
Fix: F-67349r981653_fix
Configure the ALG to employ organization-defined controls by type of DoS to achieve the DoS objective.
- RMF Control
- Severity
- M
- CCI
- CCI-004891
- Version
- SRG-NET-000715-ALG-000120
- Vuln IDs
-
- V-263542
- Rule IDs
-
- SV-263542r982393_rule
Checks: C-67442r982392_chk
Verify the ALG is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the ALG is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.
Fix: F-67350r981656_fix
Configure the ALG to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- RMF Control
- Severity
- M
- CCI
- CCI-004905
- Version
- SRG-NET-000735-ALG-000130
- Vuln IDs
-
- V-263543
- Rule IDs
-
- SV-263543r981660_rule
Checks: C-67443r981658_chk
Verify the ALG is configured to implement antispoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process. If the ALG is not configured to implement antispoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process, this is a finding.
Fix: F-67351r981659_fix
Configure the ALG to implement antispoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process.
- RMF Control
- Severity
- M
- CCI
- CCI-004909
- Version
- SRG-NET-000750-ALG-000140
- Vuln IDs
-
- V-263544
- Rule IDs
-
- SV-263544r982395_rule
Checks: C-67444r982394_chk
Verify the ALG is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If the ALG is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix: F-67352r981662_fix
Configure the ALG to include only approved trust anchors in trust stores or certificate stores managed by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004910
- Version
- SRG-NET-000755-ALG-000150
- Vuln IDs
-
- V-263545
- Rule IDs
-
- SV-263545r982397_rule
Checks: C-67445r982396_chk
Verify the ALG is configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the ALG is not configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Fix: F-67353r981665_fix
Configure the ALG to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- RMF Control
- Severity
- M
- CCI
- CCI-004931
- Version
- SRG-NET-000760-ALG-000160
- Vuln IDs
-
- V-263546
- Rule IDs
-
- SV-263546r982399_rule
Checks: C-67446r982398_chk
Verify the ALG is configured to establish organization-defined alternate communications paths for system operations organizational command and control. If the ALG is not configured to establish organization-defined alternate communications paths for system operations organizational command and control, this is a finding.
Fix: F-67354r981668_fix
Configure the ALG to establish organization-defined alternate communications paths for system operations organizational command and control.
- RMF Control
- Severity
- M
- CCI
- CCI-004963
- Version
- SRG-NET-000765-ALG-000170
- Vuln IDs
-
- V-263547
- Rule IDs
-
- SV-263547r981672_rule
Checks: C-67447r981670_chk
Verify the ALG is configured to implement signature based and/or nonsignature based malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code. If the ALG is not configured to implement signature based and/or nonsignature based malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code, this is a finding.
Fix: F-67355r981671_fix
Configure the ALG to implement signature based and/or nonsignature based malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code.
- RMF Control
- Severity
- M
- CCI
- CCI-004966
- Version
- SRG-NET-000770-ALG-000180
- Vuln IDs
-
- V-263548
- Rule IDs
-
- SV-263548r982401_rule
Checks: C-67448r982400_chk
Verify the ALG is configured to configure malicious code protection mechanisms to send alerts to organization-defined personnel in response to malicious code detection. If the ALG is not configured to configure malicious code protection mechanisms to send alerts to organization-defined personnel in response to malicious code detection, this is a finding.
Fix: F-67356r981674_fix
Configure the ALG to configure malicious code protection mechanisms to send alerts to organization-defined personnel in response to malicious code detection.