NIPRNet DoD DMZ Devices STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −1 ✎ 2
Comparison against the immediately-prior release (V2R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 1
- V-17380 High VLANs must be established to isolate unrestricted and restricted data.
Content changes 2
- V-15078 Medium fix Users of the DMZ SIM service must utilize DoD approved CAC/PKI for authentication.
- V-17378 Medium checkfix If logical rather than physical separation is used, VLANs must be defined so separation between different data types is maintained for unrestricted, restricted, and private data.
- RMF Control
- Severity
- L
- CCI
- Version
- DMZ-FW4
- Vuln IDs
-
- V-14990
- Rule IDs
-
- SV-15758r1_rule
Checks: C-13417r1_chk
Review the firewall configuration to determine compliance. A single/dedicated administration interface must be present on the firewall controlling all operational firewall functions from a single location.
Fix: F-14520r1_fix
Configure the DMZ firewall system to provide a single administrative interface on the management network controlling all operational firewall functions from a single location.
- RMF Control
- Severity
- M
- CCI
- Version
- DMZ-DNS5
- Vuln IDs
-
- V-15016
- Rule IDs
-
- SV-15784r1_rule
Checks: C-13445r1_chk
Review the site's DNS configuration to verify all inbound DNS queries are being proxied to the NIPRNet authoritative DNS servers via the DoD DNS .mil proxy.
Fix: F-14546r1_fix
Configure DNS servers to utilize the DoD DNS .mil proxy for all inbound DNS queries.
- RMF Control
- Severity
- L
- CCI
- Version
- DMZ-NET5.3
- Vuln IDs
-
- V-15022
- Rule IDs
-
- SV-15790r1_rule
Checks: C-13451r1_chk
Review the report data or report template, from the DMZ IA devices, sent to the applicable CNDS to ensure the following are incorporated into the report: Reporting device name, Date and Time Stamp of event, Source and Destination IP address, Port, Protocol, User ID (if available), alert code and/or description.
Fix: F-14552r1_fix
Configure the system’s alert application data to include, at a minimum: Reporting device name, Date and Time Stamp of event, Source and Destination IP address, Port, Protocol, User ID (if available), alert code and/or the description.
- RMF Control
- Severity
- L
- CCI
- Version
- DMZ-NET5.1
- Vuln IDs
-
- V-15023
- Rule IDs
-
- SV-15791r1_rule
Checks: C-13452r1_chk
Review the following IA devices to ensure alerts are being managed and sent to the local SIM: routers, switches, firewalls (including Host-based FWs and IPS), Reverse Web Proxy (RWP), Web Application Firewall (WAP), Database Security Gateway (DBSG), HBSS, IDS (including Host-Based IDS), and host integrity system. The system will report all denied traffic flows and user transactions with source user, when possible, and the source IP address, at a minimum.
Fix: F-14553r1_fix
Configure each IA device within the DMZ to send all alerts, based on individual configurations, to the local (or appropriate CND) Security Information Manager. Alerts will include at a minimum, source user, when possible, and the source IP address.
- RMF Control
- Severity
- M
- CCI
- Version
- DMZ-NET6.1
- Vuln IDs
-
- V-15024
- Rule IDs
-
- SV-15792r1_rule
Checks: C-13453r1_chk
System components are required to report IA health data via Simple Network Management Protocol (SNMP), or other communication means, to the Element Management System (EMS) as follows: - CPU, RAM, and Hard Disk utilization - Services and processes running - Interface status (up or down) and interface statistics - Statistics on packets allowed and denied - Authentication failure statistics
Fix: F-14554r1_fix
Configure all system components to report IA health data and send log data to the logging server.
- RMF Control
- Severity
- M
- CCI
- Version
- DMZ-1.3
- Vuln IDs
-
- V-15025
- Rule IDs
-
- SV-15793r1_rule
Checks: C-13454r1_chk
Review a random sampling of device IP addresses and the firewalling capability (to include firewall, router, RWP, etc.) configuration to determine compliance. NAT is not permitted within the DoD DMZ unless forensic traceability is maintained so the source and destination IP address can be positively identified for all transactions and as long as log files or tables can trace the IP addresses.
Fix: F-14555r1_fix
NAT is not permitted within the DMZ unless forensic traceability, within the DoD IP space, is maintained so the source and destination IP address can be positively identified for all transactions.
- RMF Control
- Severity
- M
- CCI
- Version
- DMZ-RWP1.3
- Vuln IDs
-
- V-15050
- Rule IDs
-
- SV-15818r1_rule
Checks: C-13478r1_chk
Review the DMZ reverse web proxy configuration to ensure it is configured to analyze HTTP and FTP headers.
Fix: F-14579r1_fix
Configure the DMZ reverse web proxy to analyze HTTP and FTP headers.
- RMF Control
- Severity
- M
- CCI
- Version
- DMZ-LR1
- Vuln IDs
-
- V-15071
- Rule IDs
-
- SV-15839r1_rule
Checks: C-13510r1_chk
Review the logging server (e.g., syslog server) and a random sampling of DMZ devices to determine if all events are logged in accordance with the CONOPS, to include administrative activities, and CND events. Review to determine if a log viewing tool is available and if all logs are sent to a remote system via syslog.
Fix: F-14601r1_fix
Configure DMZ devices to log all events, to include, the reason for all file scanning failures for data-at-rest and in transit. DMZ systems will provide a log viewing tool and send all logs to a remote system via syslog.
- RMF Control
- Severity
- L
- CCI
- Version
- DMZ-LR2
- Vuln IDs
-
- V-15072
- Rule IDs
-
- SV-15840r1_rule
Checks: C-13511r1_chk
Review a random sampling of DMZ devices to ensure they are configured to encrypt all logs in transit utilizing a FIPS 140-2 validated encryption algorithm.
Fix: F-14602r1_fix
Configure DMZ systems to protect logs in transport using IPSec or TLS v1 in accordance with FIPS 140-2 requirements.
- RMF Control
- Severity
- M
- CCI
- Version
- DMZ-SIM5.2
- Vuln IDs
-
- V-15076
- Rule IDs
-
- SV-15844r1_rule
Checks: C-13515r1_chk
Review the configuration of any site to site communication channels to ensure SIM and log data is encrypted in transport utilizing a FIPS 140-2 validated encryption algorithm. 1) Review the DMZ architecture and determine if aggregated log/SIM data is transmitted to any other site. 2) If aggregated log/SIM data is transmitted to any other site, review communications capability and verify FIPS 140-2 encryption capability is used to encrypt the data for transmission.
Fix: F-14606r1_fix
Configure the transport mechanism of any site to site communications of aggregated DMZ SIM or log data to encrypt the transport. Data must be encrypted during transmission using validated FIPS 140-2 cryptography in order to minimize the risk of the data’s exposure if intercepted or misrouted.
- RMF Control
- Severity
- M
- CCI
- Version
- DMZ-SIM8.1
- Vuln IDs
-
- V-15078
- Rule IDs
-
- SV-15846r1_rule
Checks: C-13517r1_chk
Review the DMZ policy and procedures to ensure approved DoD CAC and DoD PKI are used for authentication. Review the SIM server configuration to ensure CAC/PKI is used for authentication.
Fix: F-14608r1_fix
Configure the SIM server to use DoD-approved CAC/PKI for authentication for all authorized users of the SIM service use.
- RMF Control
- Severity
- L
- CCI
- Version
- DMZ-SIM12.2
- Vuln IDs
-
- V-15080
- Rule IDs
-
- SV-15848r1_rule
Checks: C-13519r1_chk
Review the SIM software running configuration to determine if it is configured to detect and alert on abnormal network behavior. Abnormal network behavior would be identified as anything other than what is documented in the network’s standard traffic baseline.
Fix: F-14610r1_fix
Configure the SIM software to automatically detect and alert on abnormal network behavior.
- RMF Control
- Severity
- H
- CCI
- Version
- DMZ-FW4.4
- Vuln IDs
-
- V-15091
- Rule IDs
-
- SV-15859r1_rule
Checks: C-13533r1_chk
Verify the firewall is configured to identify, alert on, and drop spoofed IP addresses as follows: 1) Incoming packet from the Internet with an internal network IP address as the source address (i.e., a source IP address from a network being protected by the firewall). 2) Outgoing packet from an internal network with an external IP address as the source address (i.e., a source IP address not from the internal protected network).
Fix: F-14621r1_fix
Configure the NIPRNet DMZ firewall to identify and alert on internal spoofed IP addresses and drop all packets identified with spoofed IP addresses.
- RMF Control
- Severity
- M
- CCI
- Version
- DMZ-FTP1.1
- Vuln IDs
-
- V-17370
- Rule IDs
-
- SV-18424r1_rule
Checks: C-18079r1_chk
Review the perimeter devices, such as the application gateway or firewall, to ensure all FTP sessions are proxied.
Fix: F-17277r1_fix
Configure the network devices to ensure the DMZ system(s) proxies all FTP sessions through an FTP proxy.
- RMF Control
- Severity
- M
- CCI
- Version
- DMZ-LNSR1
- Vuln IDs
-
- V-17378
- Rule IDs
-
- SV-18432r2_rule
Checks: C-18087r2_chk
Review the switch VLAN configuration to ensure U/R/P data is logically separated via VLANs. Separation must be maintained from the server to the DMZ firewall. This check only applies if the CC/S/A/FA extension is logically, not physically, separating the services based on data type.
Fix: F-17284r2_fix
Configure VLANs so logical separation between different data types is maintained from the server to the firewall.