STIGQter STIGQter: STIG Summary: Palo Alto Networks ALG Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected.

DISA Rule

SV-228873r557387_rule

Vulnerability Number

V-228873

Group Title

SRG-NET-000392-ALG-000148

Rule Version

PANW-AG-000121

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure a Log Forwarding Profile:
Go to Objects >> Log Forwarding
Go to Policies >> DoS Protection
Select "Add" to create a new policy or select the Name of the Policy to edit it.
In the "DoS Rule" Window, complete the required fields.
In the "Option/Protection" tab, in the "Log Forwarding" field, select the configured Log Forwarding Profile.
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.

Alternately, a Zone Protection Profile can be used either instead of or in addition to a DoS Protection Policy.
Go to Network>>Zone
Select “Add” or select an existing Zone.
In the Zone window, in the Zone Protection Profile field, select or create a Zone Protection Profile.
Configure the applicable fields in the Flood Protection, Reconnaissance Protection, and Packet Based Attack Protection as needed.
In the Zone window, in the Log Setting field, select a configured log forwarding profile.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.

Check Contents

Ask the Administrator how the ISSO and ISSM are receiving alerts (email, SNMP Trap, or Syslog).
View the configured Server Profile:
Go to Device >> Server Profiles; if there is no Server Profile for the method explained, this is a finding.

View the Log Forwarding Profiles:
Go to Objects >> Log Forwarding
Determine which Server Profile is associated with each Log Forwarding Profile.
If there are no Log Forwarding Profiles configured, this is a finding.
Go to Policies >> DoS Protection
If there are no DoS Protection Policies, this is a finding. There may be more than one configured DoS Protection Policy.
If there is no such DoS Protection Policy, this is a finding.
In the "Log Forwarding" field, if there is no configured Log Forwarding Profile, this is a finding.

Alternately, a Zone Protection Profile can be used either instead of or in addition to a DoS Protection Policy.
Ask the Administrator how the ISSO and ISSM are receiving alerts (E-mail, SNMP Trap, or Syslog).
View the configured Server Profile, if there is no Server Profile for the method explained, this is a finding.
View the Log Forwarding Profiles:
Go to Objects >> Log Forwarding
Determine which Server Profile is associated with each Log Forwarding Profile.

Vulnerability Number

V-228873

Documentable

False

Rule Version

PANW-AG-000121

Severity Override Guidance

Ask the Administrator how the ISSO and ISSM are receiving alerts (email, SNMP Trap, or Syslog).
View the configured Server Profile:
Go to Device >> Server Profiles; if there is no Server Profile for the method explained, this is a finding.

View the Log Forwarding Profiles:
Go to Objects >> Log Forwarding
Determine which Server Profile is associated with each Log Forwarding Profile.
If there are no Log Forwarding Profiles configured, this is a finding.
Go to Policies >> DoS Protection
If there are no DoS Protection Policies, this is a finding. There may be more than one configured DoS Protection Policy.
If there is no such DoS Protection Policy, this is a finding.
In the "Log Forwarding" field, if there is no configured Log Forwarding Profile, this is a finding.

Alternately, a Zone Protection Profile can be used either instead of or in addition to a DoS Protection Policy.
Ask the Administrator how the ISSO and ISSM are receiving alerts (E-mail, SNMP Trap, or Syslog).
View the configured Server Profile, if there is no Server Profile for the method explained, this is a finding.
View the Log Forwarding Profiles:
Go to Objects >> Log Forwarding
Determine which Server Profile is associated with each Log Forwarding Profile.

Check Content Reference

M

Target Key

4233

Comments