Firewall Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 41
Comparison against the immediately-prior release (V1R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 41
- V-79409 High checkfix The firewall must be configured to use filters that use packet headers and packet attributes, including source and destination IP addresses and ports, to prevent the flow of unauthorized or suspicious traffic between interconnected networks with different security policies (including perimeter firewalls and server VLANs).
- V-79411 Medium checkfix The firewall must fail closed if the firewall filtering function is nonfunctional.
- V-79413 High checkfix The firewall must employ filters that prevent or limit the effects of all types of commonly known denial-of-service (DoS) attacks, including flooding, packet sweeps, and unauthorized port scanning.
- V-79415 High checkfix The firewall must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
- V-79417 Medium checkfix The firewall must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services on the network segment in accordance as defined in the Ports, Protocols, and Services Management (PPSM) CAL and vulnerability assessments.
- V-79419 Medium checkfix The firewall must block outbound traffic containing denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.
- V-79421 Medium checkfix The firewall implementation must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.
- V-79423 Medium checkfix The firewall that filters traffic from the VPN access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
- V-79425 Medium checkfix The firewall that filters traffic from the wireless access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
- V-79427 Medium checkfix The firewall must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.
- V-79429 Medium checkfix The firewall must generate traffic log records when traffic is denied, restricted, or discarded.
- V-79431 Medium checkfix The firewall must generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
- V-79433 Medium checkfix The firewall must be configured to allow authorized users to record a packet capture based IP, traffic type (TCP, UDP, or ICMP), or protocol.
- V-79435 Medium checkfix The firewall must generate traffic log entries containing information to establish what type of events occurred.
- V-79437 Medium checkfix The firewall must generate traffic log entries containing information to establish when (date and time) the events occurred.
- V-79439 Medium checkfix The firewall must generate traffic log entries containing information to establish the location on the network where the events occurred.
- V-79441 Low checkfix The firewall must generate traffic log entries containing information to establish the source of the events, such as the source IP address at a minimum.
- V-79443 Medium checkfix The firewall must generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.
- V-79445 Medium checkfix The firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries.
- V-79447 Medium checkfix If communication with the central audit server is lost, the firewall must generate a real-time alert to, at a minimum, the SCA and ISSO.
- V-79449 Medium checkfix The firewall must be configured to send a real-time alert to the ISSO and SA (at a minimum) in the event of an audit processing failure on the firewall itself.
- V-79451 Medium checkfix In the event that communication with the central audit server is lost, the firewall must continue to queue traffic log records locally.
- V-79453 Medium checkfix The firewall must protect traffic log records from unauthorized access while in transit to the central audit server.
- V-79455 Medium checkfix The firewall must protect traffic log records from unauthorized read access while stored locally.
- V-79457 Medium checkfix The firewall must protect the traffic log from unauthorized modification of local log records.
- V-79459 Medium checkfix The firewall must protect the traffic log from unauthorized deletion of local log files and log records.
- V-79461 Medium checkfix The firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
- V-79463 Medium checkfix The firewall must fail to a secure state if the firewall filtering functions fail unexpectedly.
- V-79465 Medium checkfix In the event of a system failure of the firewall function, the firewall must be configured to save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
- V-79467 Medium checkfix The perimeter firewall must be configured for service redundancy, load balancing, or other organization-defined safeguards to limit the effects of types of denial-of-service (DoS) attacks on the network.
- V-79469 Medium checkfix The firewall must apply ingress filters to traffic that is inbound to the network through any active external interface.
- V-79471 Medium checkfix The firewall must apply egress filters to traffic that is outbound from the network through any internal interface.
- V-79473 Medium checkfix The firewall must establish ingress filters that block inbound packets where the destination is an IP address assigned to the management or loopback addresses of the enclave protection devices unless the packet has a source address assigned to the management network or network infrastructure.
- V-79475 Medium checkfix The firewall must block or restrict inbound IP packets destined to the control plane of the firewall itself.
- V-79477 Medium checkfix The premise firewall (located behind the premise router) must block all outbound management traffic.
- V-79479 Medium checkfix The firewall must restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address.
- V-79481 Medium checkfix The firewall must block outbound IP packets that contain illegitimate packet attributes including, at a minimum, invalid source address or packets that fail minimum length tests (TCP length, UDP length, IP data length) that have undefined protocol numbers, improper use of hop-by-hop header, or IPv6 RH0 header.
- V-79483 Medium checkfix The firewall must be configured to fail securely in the event of an operational failure of the firewall filtering or boundary protection function.
- V-79485 Medium checkfix The perimeter firewall must filter traffic destined to the internal enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL), Vulnerability Assessments (VAs) for that the enclave.
- V-79487 Low checkfix The firewall must be configured to allow the system administrator to select a subset of DoD-required auditable events.
- V-79489 Low checkfix The firewall must generate an alert that can be forwarded to, at a minimum, the ISSO and ISSM when denial-of-service (DoS) incidents are detected.
- RMF Control
- AC-4
- Severity
- H
- CCI
- CCI-001414
- Version
- SRG-NET-000019-FW-000003
- Vuln IDs
-
- V-79409
- Rule IDs
-
- SV-94115r1_rule
Checks: C-79023r1_chk
Verify the firewall is configured to use filters to restrict or block information system services based on best practices, known threats, and guidance in the Ports, Protocols, Services Management (PPSM) database regarding restrictions for boundary crossing for ports, protocols, and services. If the firewall cannot be configured with filters that employ packet header and packet attributes, including source and destination IP addresses and ports, to prevent the flow of unauthorized or suspicious traffic between interconnected networks with different security policies, this is a finding.
Fix: F-86181r1_fix
Configure filters in the firewall to examine characteristics of incoming and outgoing packets, including but not limited to the following: - Bit fields in the packet header, including IP fragmentation flags, IP options, and TCP flags - IP version 4 (IPv4) numeric range, including destination port, DiffServ code point (DSCP) value, fragment offset, Internet Control Message Protocol (ICMP) code, ICMP packet type, interface group, IP precedence, packet length, protocol, and TCP and UDP source and destination port - IP version 6 (IPv6) numeric range, including class of service (CoS) priority, destination address, destination port, ICMP code, ICMP packet type, interface group, IP address, next header, packet length, source address, source port, and TCP and UDP source and destination port - Source and destination address and prefix list
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-FW-000160
- Vuln IDs
-
- V-79411
- Rule IDs
-
- SV-94117r1_rule
Checks: C-79025r1_chk
Review the firewall configuration to verify traffic flow defaults to closed when the firewall filtering function aborts or is nonfunctional. If the firewall is configured to allow traffic flow to attached interfaces when the firewall filtering function is non-functional, this is a finding.
Fix: F-86183r1_fix
Configure the firewall to fail closed. The firewall must block all traffic rather than allowing all traffic when a network element component fails (e.g., fail closed and do not forward traffic). The recommended architecture is to implement load balancing so that the failure of the firewall redirects traffic to another filtering device. Obtain a risk acceptance in order to fail open.
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-002385
- Version
- SRG-NET-000362-FW-000028
- Vuln IDs
-
- V-79413
- Rule IDs
-
- SV-94119r1_rule
Checks: C-79027r1_chk
View the security filters for each interface or security zone. Verify DoS filters are configured to detect and prevent known DoS attacks such as IP sweeps, TCP sweeps, buffer overflows, unauthorized port scanning, SYN floods, UDP floods, and UDP sweeps. If filters are not configured or if the security zone is not configured with filters that guard against common DoS attacks, this is a finding.
Fix: F-86185r1_fix
Configure the firewall to detect and prevent DoS attacks. Implement filters with thresholds that are customized for the specific environment where applicable. DoS filters are based on NIST 800-53 requirements and vendor recommendations. The following sample commands show filters that implement this requirement (these are examples only): set filter1 icmp ip-sweep threshold 1000 set filter2 tcp port-scan threshold 1000 set filter3 tcp syn-flood alarm-threshold 1000 set filter3 tcp syn-flood attack-threshold 1100 set filter4 tcp syn-flood source-threshold 100 set filter5 tcp syn-flood destination-threshold 2048 set filter6 tcp syn-flood timeout 20 set filter7 tcp tcp-sweep threshold 1000 set filter8 udp flood threshold 5000 set filter9 udp udp-sweep threshold 1000
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-001109
- Version
- SRG-NET-000202-FW-000039
- Vuln IDs
-
- V-79415
- Rule IDs
-
- SV-94121r2_rule
Checks: C-79029r2_chk
Determine the default security policies on the firewall for traffic from one zone to another zone (inter-zone). The default policy must be a "Deny" policy that blocks all inter-zone traffic by default. Ensure no policy that circumvents the default "Deny" inter-zone policy is allowed. Traffic through the firewall is filtered so that only the specific traffic that is approved and registered in the PPSM CAL and VAs for the enclave. Verify rules or access control statements containing "any" for either the host, destination, protocol, or port are not used. If the firewall does not deny all network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception), this is a finding.
Fix: F-86187r2_fix
Configure the firewall with a "Deny" inter-zone policy which, by default, blocks traffic between zones and allows network communications traffic by exception (i.e., deny all, permit by exception) in accordance with PPSM CAL and VAs for the enclave.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-FW-000026
- Vuln IDs
-
- V-79417
- Rule IDs
-
- SV-94123r1_rule
Checks: C-79031r1_chk
Verify the firewall is configured to disable or restrict the use of functions, ports, protocols, and/or services on the network segment that are not allowed by the PPSM CAL and vulnerability assessments. Verify all applications used in the enclave are registered in the PPSM database. Review the vulnerability assessment for each port, protocol, and service allowed into the enclave and apply all appropriate mitigations defined in the Vulnerability Assessment report for that port, protocol, and service. Compare enabled functions, ports, and services with the PPSM requirements. If prohibited functions, ports, protocols, and services are enabled, this is a finding.
Fix: F-86189r1_fix
SCAs must review the vulnerability assessment for each port, protocol, and service allowed into the enclave and apply all appropriate mitigations defined in the Vulnerability Assessment report. Register only ports, protocols, and functions allowed into the enclave in the PPSM database. The enclave owner must register the applications used in the PPSM database. Consult the packet/stateful firewall knowledge base and configuration guides to determine the commands for disabling each port, protocol, service, or function that is not in compliance.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-NET-000192-FW-000029
- Vuln IDs
-
- V-79419
- Rule IDs
-
- SV-94125r1_rule
Checks: C-79033r1_chk
Obtain and review the list of outbound interfaces and zones from site personnel. Review each of the configured outbound interfaces and zones. Verify zones that communicate outbound have been configured with the DoS firewall filter (i.e., rules, access control lists [ACLs], screens, or policies) such as IP sweeps, TCP sweeps, buffer overflows, unauthorized port scanning, SYN floods, UDP floods, and UDP sweeps. If all outbound interfaces are not configured to block DoS attacks, this is a finding.
Fix: F-86191r1_fix
Associate a properly configured DoS firewall filter (e.g., rules, access control lists [ACLs], screens, or policies) to outbound interfaces and security zones. Apply a firewall filter to each outbound interface example: set security zones security-zone untrust interfaces <OUTBOUND-INTERFACE> set security zones security-zone trust screen untrust-screen
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-FW-000030
- Vuln IDs
-
- V-79421
- Rule IDs
-
- SV-94127r1_rule
Checks: C-79035r1_chk
Use the "show" command to verify that all inbound interfaces have a stateless firewall filter to set rate limits based on a destination. If the firewall does not have a stateless firewall filter that sets rate limits based on a destination, this is a finding.
Fix: F-86193r1_fix
Configure a stateless firewall filter to set rate limits based on a destination of the packets. Apply the stateless firewall filter to all inbound interfaces.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-NET-000061-FW-000001
- Vuln IDs
-
- V-79423
- Rule IDs
-
- SV-94129r1_rule
Checks: C-79037r1_chk
Review the firewall configuration statements used to create a group policy with filtering rules for remote clients accessing the network using a VPN. Verify both ingress and egress traffic on this interface is subject to the remote access policy and filtering rules required by the organization. If the firewall is used to filter traffic from the VPN access points but is not configured with filtering rules that apply to the monitoring of remote access traffic, this is a finding.
Fix: F-86195r1_fix
Configure a group policy for remote clients and apply to the interface that is connected to allow ingress and egress to the VPN access points.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-NET-000061-FW-000002
- Vuln IDs
-
- V-79425
- Rule IDs
-
- SV-94131r1_rule
Checks: C-79039r1_chk
Review the firewall configuration statements used to create a group policy with filtering rules for wireless clients accessing the network using a wireless access point. Verify both ingress and egress traffic on this interface is subject to the remote access policy and filtering rules required by the organization. If the firewall is used to filter traffic from the wireless access points but is not configured with filtering rules that apply to the monitoring of wireless access traffic, this is a finding.
Fix: F-86197r1_fix
Configure a group policy for wireless clients and apply to the interface that is connected to allow ingress and egress to the wireless access points.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-FW-000004
- Vuln IDs
-
- V-79427
- Rule IDs
-
- SV-94133r1_rule
Checks: C-79041r1_chk
Verify the firewall immediately uses updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones. For example, there is no need to reinitialize or reboot or the action to commit the changes is prompted. If the firewall does not immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones, this is a finding.
Fix: F-86199r1_fix
Require system administrators to commit and test changes upon configuration of the firewall.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000492-FW-000006
- Vuln IDs
-
- V-79429
- Rule IDs
-
- SV-94135r1_rule
Checks: C-79043r1_chk
View the configuration of the firewall or the central audit server log records. Verify the firewall generates traffic log records when traffic is denied, restricted, or discarded. If the firewall does not generate traffic log records for events when traffic is denied, restricted, or discarded, this is a finding.
Fix: F-86201r1_fix
Configure the firewall central audit server stanza to generate traffic log records for events when traffic is denied, restricted, or discarded.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000493-FW-000007
- Vuln IDs
-
- V-79431
- Rule IDs
-
- SV-94137r1_rule
Checks: C-79045r1_chk
View the configuration of the firewall or the central audit server log records. Verify the firewall generates traffic log records when attempts are made to send packets between security zones that are not authorized to communicate. If the firewall does not generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate, this is a finding.
Fix: F-86203r1_fix
Configure the firewall central audit server stanza to generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001462
- Version
- SRG-NET-000399-FW-000008
- Vuln IDs
-
- V-79433
- Rule IDs
-
- SV-94139r1_rule
Checks: C-79047r1_chk
View the documented process for packet capture. Verify the firewall allows authorized users to perform a packet capture based on IP, traffic type (TCP, UDP, or ICMP), or protocol. If the firewall is not configured to allow authorized users to capture, record, and log all content related to a user session, this is a finding.
Fix: F-86205r1_fix
Document a process for authorized users to capture, record, and log all content based on IP, traffic type (TCP, UDP, or ICMP), or protocol.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-NET-000074-FW-000009
- Vuln IDs
-
- V-79435
- Rule IDs
-
- SV-94141r1_rule
Checks: C-79049r1_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include sufficient information to determine the type or category for each event in the traffic log. If the traffic log entries do not include enough information to determine what type of event occurred, this is a finding.
Fix: F-86207r1_fix
Configure the firewall to ensure entries sent to the traffic log include sufficient information to determine the type or category for each event in the traffic log.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-NET-000075-FW-000010
- Vuln IDs
-
- V-79437
- Rule IDs
-
- SV-94143r1_rule
Checks: C-79051r1_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include the date and time of each event. If the traffic log entries do not include the date and time the event occurred, this is a finding.
Fix: F-86209r1_fix
Configure the firewall to ensure entries sent to the traffic log include the date and time of the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-FW-000011
- Vuln IDs
-
- V-79439
- Rule IDs
-
- SV-94145r1_rule
Checks: C-79053r1_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include the location of each event (e.g., network name, network subnet, port, or network segment). If the traffic log entries do not include the event location, this is a finding.
Fix: F-86211r1_fix
Configure the firewall to ensure entries sent to the traffic log include the location of each event (e.g., network name, network subnet, network segment, or port).
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- SRG-NET-000077-FW-000012
- Vuln IDs
-
- V-79441
- Rule IDs
-
- SV-94147r1_rule
Checks: C-79055r1_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include sufficient information to ascertain the source of the events (e.g., IP address, session, or packet ID). If the traffic log entries do not include sufficient information to ascertain the source of the events, this is a finding.
Fix: F-86213r1_fix
Configure the firewall implementation to ensure entries sent to the traffic log include sufficient information to ascertain the source of each event (e.g., IP address, session, or packet ID).
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000078-FW-000013
- Vuln IDs
-
- V-79443
- Rule IDs
-
- SV-94149r1_rule
Checks: C-79057r1_chk
Examine the traffic log configuration on the firewall or view several alert events on the organization's central audit server. Verify the entries sent to the traffic log include sufficient information to ascertain the outcome of the firewall rules. Verify that, at a minimum, the success or failure of the event is evented. If the traffic log entries do not include sufficient information to ascertain the outcome of the application of the firewall rules, this is a finding. If the traffic log entries do not include the success or failure of the application of the firewall rules, this is a finding.
Fix: F-86215r1_fix
Configure the firewall to generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-NET-000333-FW-000014
- Vuln IDs
-
- V-79445
- Rule IDs
-
- SV-94151r1_rule
Checks: C-79059r1_chk
Examine the traffic log configuration on the firewall. Verify the firewall is configured to send traffic log entries to the organization's central audit server. If the firewall is not configured to send traffic log entries to the organization's central audit server, this is a finding.
Fix: F-86217r1_fix
Configure the firewall to ensure traffic log entries are transmitted to the organization's central audit server (e.g., syslog server).
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-NET-000335-FW-000017
- Vuln IDs
-
- V-79447
- Rule IDs
-
- SV-94153r1_rule
Checks: C-79061r1_chk
If a network device such as the events, network management, or SNMP server is configured to send an alert when communication is lost with the central audit server, this is not a finding. Verify the firewall is configured to send an alert via instant message, email, SNMP, or another authorized method to the SCA, ISSO, and other identified personnel when communication is lost with the central audit server. If the firewall is not configured to send an immediate alert via an approved method when communication is lost with the central audit server, this is a finding.
Fix: F-86219r1_fix
Configure the firewall (or another network device) to send an alert via instant message, email, or another authorized method to the SCA, ISSO, and other identified personnel for any log failure event where the filtering functions are unable to write events to the central audit server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-NET-000088-FW-000018
- Vuln IDs
-
- V-79449
- Rule IDs
-
- SV-94155r1_rule
Checks: C-79063r1_chk
If a network device such as the events, network management, or SNMP server are configured to send an alert when an audit processing failure occurs, this is not a finding. Verify the firewall is configured to send an alert via instant message, email, SNMP or another authorized method to the ISSO, SA, and other identified personnel when an audit processing failure occurs. If the firewall is not configured to send an alert via an approved and immediate method when an audit processing failure occurs, this is a finding.
Fix: F-86221r1_fix
Configure the firewall (or another network device) to send an alert via instant message, email, or another authorized method to the ISSO, SA, and other identified personnel when an audit processing failure that prevents the device from generating, storing or sending events occurs on the device itself (e.g., a failure of the event daemon).
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-NET-000089-FW-000019
- Vuln IDs
-
- V-79451
- Rule IDs
-
- SV-94157r1_rule
Checks: C-79065r1_chk
Verify logging has been enabled and configured for local queuing of the traffic log. If a local log file (or files) is not configured to capture events locally if communication with the central audit server is lost, this is a finding.
Fix: F-86223r1_fix
Configure local backup events files to capture DoD-defined auditable events either consistently or, if possible, in the event communication with the central audit server is lost.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-NET-000098-FW-000021
- Vuln IDs
-
- V-79453
- Rule IDs
-
- SV-94159r1_rule
Checks: C-79067r1_chk
Verify that all communication with the central audit server is going out the interface that is connected to the management network and is protected by an encryption solution such as the management network's VPN. If the firewall does not use either encryption or logical separation to protect transmitted traffic log records while in transit to the central audit server, this is a finding.
Fix: F-86225r1_fix
Configure the firewall to use either encryption or logical separation to protect transmitted traffic log records while in transit to the central audit server. The preferred solution is for all communication with the central audit server to egress via the management network interface and be protected by the management network's VPN.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-NET-000098-FW-000022
- Vuln IDs
-
- V-79455
- Rule IDs
-
- SV-94161r1_rule
Checks: C-79071r1_chk
Verify the firewall's fine-grained permissions are configured to control access to the log store where the traffic log is located. If the firewall does not protect traffic log records from unauthorized read access while stored locally, this is a finding.
Fix: F-86227r1_fix
Validate the firewall includes a baseline cryptographic module that provides confidentiality and integrity services for authentication and for protecting communications with adjacent systems. Configure role-based, fine-grained permissions management for controlling access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-NET-000099-FW-000161
- Vuln IDs
-
- V-79457
- Rule IDs
-
- SV-94163r1_rule
Checks: C-79073r1_chk
Verify the firewall's fine-grained permissions are configured to prevent unauthorized modification of local log records. If the firewall does not protect traffic log records from unauthorized modification while stored locally, this is a finding.
Fix: F-86229r1_fix
Validate the firewall includes a baseline cryptographic module that provides confidentiality and integrity services for authentication and for protecting communications with adjacent systems. Configure role-based, fine-grained permissions management for controlling commands needed to modify log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-NET-000100-FW-000023
- Vuln IDs
-
- V-79459
- Rule IDs
-
- SV-94165r1_rule
Checks: C-79075r1_chk
Verify the firewall's fine-grained permissions are configured to prevent unauthorized deletion of local log files or log records. If the firewall does not protect traffic log records and log files from unauthorized deletion while stored locally, this is a finding.
Fix: F-86231r1_fix
Validate the firewall includes a baseline cryptographic module that provides confidentiality and integrity services for authentication and for protecting communications with adjacent systems. Configure role-based, fine-grained permissions management for controlling commands needed to delete log files and records.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-FW-000025
- Vuln IDs
-
- V-79461
- Rule IDs
-
- SV-94167r1_rule
Checks: C-79077r1_chk
Review the documentation and architecture for the device or check the system-installed licenses or services. Determine what services and functions are installed on the firewall. Compare installed services and functions to the documentation showing the approved services. If unneeded services and functions are installed on the device but are not part of the documented role of the device, this is a finding.
Fix: F-86233r1_fix
Display and remove unnecessary licenses, services, and functions from the firewall. Examples include NTP, DNS, and DHCP. Note: Only remove unauthorized services. This control is not intended to restrict the use of network devices with multiple authorized roles.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-FW-000133
- Vuln IDs
-
- V-79463
- Rule IDs
-
- SV-94169r1_rule
Checks: C-79079r1_chk
Review the firewall configuration to verify it fails to a secure state if the firewall filtering functions fail unexpectedly. If the firewall does not fail to a secure state if the firewall filtering functions fail unexpectedly, this is a finding.
Fix: F-86235r1_fix
Configure the firewall to fail to a secure state if the firewall filtering functions fail unexpectedly.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-NET-000236-FW-000027
- Vuln IDs
-
- V-79465
- Rule IDs
-
- SV-94171r1_rule
Checks: C-79081r1_chk
View the firewall failover configuration or system documentation. Verify that in the event of a system failure of the firewall function, the firewall saves diagnostic information, logs system messages, and loads the most current security policies, rules, and signatures. Testing of this functionality in a production environment is not recommended. If in the event of a system failure of the firewall function the firewall does not save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted, this is a finding.
Fix: F-86237r1_fix
Configure the firewall to fail securely in the event of a transiently corrupt state or failure condition. When the system restarts, the system boot process must not succeed without passing all self-tests for cryptographic algorithms, RNG tests, and software integrity tests.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-FW-000159
- Vuln IDs
-
- V-79467
- Rule IDs
-
- SV-94173r1_rule
Checks: C-79083r1_chk
Since Service redundancy and load balancing can be a highly complex configuration that can be implemented using a wide variety of configurations, ask the site representative to demonstrate the method used and the configuration. If the perimeter firewall is not configured for service redundancy, load balancing, or other organization-defined safeguards to limit the effects of types of DoS attacks on the network, this is a finding.
Fix: F-86239r1_fix
Consult vendor configuration guides and knowledge base. Implement one or more methods of service redundancy and/or load balancing (e.g., filter-based forwarding, per-flow load balancing, per-packet load balancing, or hardware redundancy options). The implementation must be tested prior to placing into production.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000031
- Vuln IDs
-
- V-79469
- Rule IDs
-
- SV-94175r1_rule
Checks: C-79085r1_chk
Obtain and review the list of authorized sources and destinations. This is usually part of the System Design Specification, Accreditation or Authorization Package, ports, protocols, and services documentation, and Ports, Protocols, and Services Management (PPSM) database. If the list of authorized sources and destinations is not available, this is a finding. Review the firewall configuration for each of the configured inbound zones and interfaces. Verify an ingress filter (e.g., Access Control List) is applied to each inbound zone/interface, including the management interface. Verify ingress filters for the management interface to block all transit traffic (i.e., any traffic not destined to the firewall itself). Verify that traffic accessing the firewall originates from the Network Operations Center (NOC). If an ingress filter is not configured for each active inbound zone or interface, this is a finding.
Fix: F-86241r1_fix
Configure a security policy to each inbound zone and/or interface to implement continuous filtering of outbound traffic. Apply security policy zones/interfaces through which inbound traffic flows from untrusted external networks or subnetworks. Configure the ingress filters for the management interface to block all transit traffic (i.e., any traffic not destined to the firewall itself) and so that traffic accessing the firewall originates from the NOC.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000032
- Vuln IDs
-
- V-79471
- Rule IDs
-
- SV-94177r2_rule
Checks: C-79087r2_chk
Obtain and review the list of authorized sources and destinations. This is usually part of the System Design Specification, Accreditation or Authorization Package, ports, protocols, and services documentation, and Ports, Protocols, and Services Management (PPSM) database. If the list of authorized sources and destinations is not available, this is a finding. Review the firewall configuration for each of the configured outbound zones and interfaces. Verify a security policy is applied to each outbound zone/interface, including the management interface. If an egress filter is not configured for each active outbound zone or interface, this is a finding.
Fix: F-86243r1_fix
Configure a security policy to each outbound zone and/or interface to implement continuous filtering of outbound traffic. Apply security policy zones/interfaces (including the management interface) through which outbound traffic flows to untrusted external networks or subnetworks.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000033
- Vuln IDs
-
- V-79473
- Rule IDs
-
- SV-94179r2_rule
Checks: C-79089r2_chk
Review the firewall ingress rules/filters for each inbound interface on the perimeter or internal firewall. Verify rules or filters are in place that: - Permits the authorized management network to access the management network or loopback interface addresses on enclave perimeter network devices - Denies any other network from accessing the management network or loopback interface addresses on enclave perimeter network devices If filters do not exist that deny inbound packets where the destination is an IP address assigned to the management or network loopback addresses of the enclave protection devices and permits the packet if it has a source address assigned to the management network or network infrastructure, this is a finding.
Fix: F-86245r2_fix
Establish ingress filters on both perimeter and internal firewalls to deny inbound packets where the destination is an IP address assigned to the management or network loopback addresses of the enclave protection devices and permits the packet if it has a source address assigned to the management network or network infrastructure. Apply this rule inbound on firewall interfaces.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000034
- Vuln IDs
-
- V-79475
- Rule IDs
-
- SV-94181r1_rule
Checks: C-79091r1_chk
Review the device configuration to determine if filters are in place to block loopback addresses. Verify packets with a destination IP address assigned to the management or loopback address range are blocked (unless the packet has a source address assigned to the management network or network infrastructure). If inbound IP packets destined to the control plane of the firewall itself are not blocked or restricted by an ingress firewall filter, this is a finding.
Fix: F-86247r1_fix
Establish ingress filters to block or restrict inbound IP packets destined to the control plane of the firewall itself.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000035
- Vuln IDs
-
- V-79477
- Rule IDs
-
- SV-94183r1_rule
Checks: C-79093r1_chk
Review the firewall configuration to verify that it is blocking all outbound management traffic. If the firewall is not blocking management network from leaking to outside networks, this is a finding.
Fix: F-86249r1_fix
With the exception of management traffic destined to perimeter equipment, configure a firewall located behind the premise router to block all outbound management traffic.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000036
- Vuln IDs
-
- V-79479
- Rule IDs
-
- SV-94185r1_rule
Checks: C-79097r1_chk
Inspect the architecture diagrams. Inspect the NOC and the managed network. Note that the IPsec tunnel endpoints may be configured on the premise or gateway router, the VPN gateway firewall, or a VPN concentrator. Verify that all traffic between the managed network and management network and vice-versa is secured via IPsec encapsulation. If the firewall does not restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address, this is a finding.
Fix: F-86253r1_fix
Where IPsec technology is deployed to connect the managed network to the NOC, restrict the traffic entering the tunnels so that only the authorized management packets with authorized destination addresses are permitted.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-FW-000037
- Vuln IDs
-
- V-79481
- Rule IDs
-
- SV-94187r1_rule
Checks: C-79099r2_chk
Review the configuration and verify the firewall blocks outbound IP packets that contain an illegitimate attributes. At a minimum, rules must exist to filter based on invalid source address or packets that fail minimum length tests (TCP length, UDP length, IP data length) that have undefined protocol numbers, improper use of hop-by-hop header, or IPv6 RH0 header. If the firewall does not block outbound IP packets that that contain illegitimate packet attributes, this is a finding.
Fix: F-86255r1_fix
Configure the firewall to block outbound IP packets that that contain illegitimate packet attributes.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001126
- Version
- SRG-NET-000365-FW-000038
- Vuln IDs
-
- V-79483
- Rule IDs
-
- SV-94189r1_rule
Checks: C-79103r1_chk
Review the configuration and verify the firewall fails securely in the event of an operational failure. This involves such items as ensuring the Access Control Lists (filters) and security policy are not corrupted and cannot be accessed. Most importantly, it should not be possible to fail to a state where firewall filtering functions no longer hold. If the firewall does not fail securely in the event of an operational failure, this is a finding.
Fix: F-86257r1_fix
Configure the firewall to fail securely in the event of an operational failure of the firewall filtering or boundary protection function. This is not the same as a hardware failure, which is covered by the NDM STIG. This involves such items as ensuring the filters and security policy are not corrupted and cannot be accessed. Most importantly, it should not be possible to fail to a state where firewall filtering functions no longer hold.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-FW-000040
- Vuln IDs
-
- V-79485
- Rule IDs
-
- SV-94191r1_rule
Checks: C-79109r1_chk
Review the perimeter firewall to verify it filters traffic destined to the internal enclave in accordance with the guidelines contained in the PPSM CAL and VAs for the enclave. If the perimeter firewall does not filter traffic destined to the internal enclave in accordance with the guidelines contained in the PPSM CAL and VAs for the enclave, this is a finding.
Fix: F-86259r1_fix
Configure the perimeter firewall to filter traffic destined to the internal enclave in accordance with the guidelines contained in the PPSM CAL and VAs for the enclave.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000169
- Version
- SRG-NET-000113-FW-000005
- Vuln IDs
-
- V-79487
- Rule IDs
-
- SV-94193r1_rule
Checks: C-79111r1_chk
Obtain a list of required auditable events from the site representative or the System Security Plan (SSP). View the firewall configuration. Verify the firewall allows the system administrator to select a subset of DoD-required auditable events. If the firewall is not configured to allow the system administrator to select a subset of DoD-required events, this is a finding.
Fix: F-86261r1_fix
Configure the firewall audit management functions to allow the authorized system administrator to select from a list of auditable events, to include the firewall's network interfaces, rules, and policies.
- RMF Control
- SI-4
- Severity
- L
- CCI
- CCI-002664
- Version
- SRG-NET-000392-FW-000042
- Vuln IDs
-
- V-79489
- Rule IDs
-
- SV-94195r1_rule
Checks: C-79117r1_chk
If a network device such as the events, network management, or SNMP server is configured to send an alert when DoS incidents are detected, this is not a finding. Verify the firewall is configured to send an alert via instant message, email, SNMP, or another authorized method to the ISSO, ISSM, and other identified personnel when DoS incidents are detected. If the firewall is not configured to send an alert via an approved and immediate method when DoS incidents are detected, this is a finding.
Fix: F-86263r1_fix
Configure the firewall (or another network device) to send an alert via instant message, email, or another authorized method to the ISSO and ISSM and other identified personnel when DoS incidents are detected.