SV-215714r557355_rule
V-215714
SRG-NET-000015-ALG-000016
F5BI-AP-000003
CAT II
10
If user access control intermediary services are provided as part of the traffic management functions of the BIG-IP Core, configure the BIG-IP APM module to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
If the BIG-IP APM module does not provide user access control intermediary services as part of the traffic management functions of the BIG-IP Core, this is not applicable.
Verify the BIG-IP APM module is configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
Navigate to the BIG-IP System manager >> Access Policy >> Access Profiles >> Access Profiles List.
Review Access Policy Profiles to verify configuration for authorization by employing identity-based, role-based, and/or attribute-based security policies.
If the BIG-IP APM is not configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies, this is a finding.
V-215714
False
F5BI-AP-000003
If the BIG-IP APM module does not provide user access control intermediary services as part of the traffic management functions of the BIG-IP Core, this is not applicable.
Verify the BIG-IP APM module is configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.
Navigate to the BIG-IP System manager >> Access Policy >> Access Profiles >> Access Profiles List.
Review Access Policy Profiles to verify configuration for authorization by employing identity-based, role-based, and/or attribute-based security policies.
If the BIG-IP APM is not configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies, this is a finding.
M
4018