Checked | Name | Title |
---|
☐ | SV-68583r1_rule | The ALG providing user access control intermediary services must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types. |
☐ | SV-68599r1_rule | The ALG providing intermediary services for remote access communications traffic must ensure inbound and outbound traffic is monitored for compliance with remote access security policies. |
☐ | SV-68601r1_rule | The ALG providing intermediary services for remote access communications traffic must control remote access methods. |
☐ | SV-68603r1_rule | The ALG providing intermediary services for remote access communications traffic must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions. |
☐ | SV-68605r1_rule | The ALG that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52. |
☐ | SV-68607r1_rule | The ALG providing intermediary services for remote access communications traffic must use NIST FIPS-validated cryptography to protect the integrity of remote access sessions. |
☐ | SV-68609r1_rule | The ALG providing intermediary services for remote access communications traffic must provide the capability to immediately disconnect or disable remote access to the information system. |
☐ | SV-68611r1_rule | To protect against data mining, the ALG providing content filtering must prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. |
☐ | SV-68613r1_rule | To protect against data mining, the ALG providing content filtering must prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code. |
☐ | SV-68615r1_rule | To protect against data mining, the ALG providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. |
☐ | SV-68617r1_rule | To protect against data mining, the ALG providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. |
☐ | SV-68619r1_rule | To protect against data mining, the ALG providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code. |
☐ | SV-68621r1_rule | The ALG must enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies. |
☐ | SV-68623r1_rule | The ALG must enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic. |
☐ | SV-68625r1_rule | The ALG must restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic. |
☐ | SV-68631r1_rule | The ALG must immediately use updates made to policy enforcement mechanisms such as policy filters, rules, signatures, and analysis algorithms for gateway and/or intermediary functions. |
☐ | SV-68633r1_rule | The ALG that is part of a CDS must apply information flow control to data transferred between security domains by means of a policy filter which consists of a set of hardware and/or software. |
☐ | SV-68635r1_rule | The ALG providing user access control intermediary services must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network. |
☐ | SV-68637r1_rule | The ALG providing user access control intermediary services must retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. |
☐ | SV-68639r1_rule | The ALG providing user access control intermediary services for publicly accessible applications must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system. |
☐ | SV-68641r1_rule | The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to access privileges occur. |
☐ | SV-68643r1_rule | The ALG must generate audit records when successful/unsuccessful attempts to access security objects occur. |
☐ | SV-68645r1_rule | The ALG that is part of a CDS must generate audit records when successful/unsuccessful attempts to access security levels occur. |
☐ | SV-68647r1_rule | The ALG must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur. |
☐ | SV-68649r1_rule | The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to modify privileges occur. |
☐ | SV-68651r1_rule | The ALG must generate audit records when successful/unsuccessful attempts to modify security objects occur. |
☐ | SV-68653r1_rule | The ALG must generate audit records when successful/unsuccessful attempts to modify security levels occur. |
☐ | SV-68655r1_rule | The ALG must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur. |
☐ | SV-68657r1_rule | The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to delete privileges occur. |
☐ | SV-68659r1_rule | The ALG must generate audit records when successful/unsuccessful attempts to delete security levels occur. |
☐ | SV-68661r1_rule | The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur. |
☐ | SV-68663r1_rule | The ALG must produce audit records containing information to establish what type of events occurred. |
☐ | SV-68665r1_rule | The ALG must produce audit records containing information to establish when (date and time) the events occurred. |
☐ | SV-68667r1_rule | The ALG must produce audit records containing information to establish where the events occurred. |
☐ | SV-68669r1_rule | The ALG must produce audit records containing information to establish the source of the events. |
☐ | SV-68671r1_rule | The ALG must produce audit records containing information to establish the outcome of the events. |
☐ | SV-68673r1_rule | The ALG must generate audit records containing information to establish the identity of any individual or process associated with the event. |
☐ | SV-68675r1_rule | The ALG must be configured to support centralized management and configuration. |
☐ | SV-68677r1_rule | The ALG must off-load audit records onto a centralized log server. |
☐ | SV-68679r1_rule | The ALG must off-load audit records onto a centralized log server in real time. |
☐ | SV-68681r1_rule | The ALG that is part of a CDS must have the capability to implement journaling. |
☐ | SV-68683r1_rule | The ALG must provide an immediate real-time alert to, at a minimum, the SCA and ISSO, of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server. |
☐ | SV-68685r1_rule | The ALG must send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs. |
☐ | SV-68687r1_rule | The ALG must shut down by default upon audit failure (unless availability is an overriding concern). |
☐ | SV-68689r1_rule | The ALG must protect audit information from unauthorized read access. |
☐ | SV-68691r1_rule | The ALG must protect audit information from unauthorized modification. |
☐ | SV-68693r1_rule | The ALG must protect audit information from unauthorized deletion. |
☐ | SV-68695r1_rule | The ALG must protect audit tools from unauthorized access. |
☐ | SV-68697r1_rule | The ALG must protect audit tools from unauthorized modification. |
☐ | SV-68699r1_rule | The ALG must protect audit tools from unauthorized deletion. |
☐ | SV-68701r1_rule | The ALG must be configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices. |
☐ | SV-68703r1_rule | The ALG that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies. |
☐ | SV-68705r1_rule | The ALG that intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies. |
☐ | SV-68707r1_rule | The ALG that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies. |
☐ | SV-68709r1_rule | The ALG that is part of a CDS must use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions. |
☐ | SV-68711r1_rule | The ALG that is part of a CDS must allow privileged administrators to enable/disable all security policy filters used to enforce information flow control. |
☐ | SV-68713r1_rule | The ALG that is part of a CDS must allow privileged administrators to configure and make changes to all security policy filters that are used to enforce information flow control. |
☐ | SV-68715r1_rule | The ALG that is part of a CDS, when transferring information between different security domains, must use organization-defined data type identifiers to validate data essential for information flow decisions. |
☐ | SV-68717r1_rule | The ALG that is part of a CDS must decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains. |
☐ | SV-68719r1_rule | The ALG that is part of a CDS, when transferring information between different security domains, must implement organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content. |
☐ | SV-68721r1_rule | The ALG that is part of a CDS, when transferring information between different security domains, must examine the information for the presence of organization-defined unsanctioned information. |
☐ | SV-68723r1_rule | The ALG that is part of a CDS must prohibit the transfer of unsanctioned information in accordance with the security policy when transferring information between different security domains. |
☐ | SV-68725r1_rule | The ALG that is part of a CDS must uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer. |
☐ | SV-68727r1_rule | The ALG that is part of a CDS must uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer. |
☐ | SV-68729r1_rule | The ALG that is part of a CDS must bind security attributes to information using organization-defined binding techniques to facilitate information flow policy enforcement. |
☐ | SV-68731r1_rule | The ALG that is part of a CDS, when transferring information between different security domains, must apply the same security policy filtering to metadata as it applies to data payloads. |
☐ | SV-68733r1_rule | The ALG that is part of a CDS must enforce dynamic traffic flow control based on organization-defined policies. |
☐ | SV-68735r1_rule | The ALG that is part of a CDS must enforce information flow control based on organization-defined metadata. |
☐ | SV-68737r1_rule | The ALG that is part of a CDS must block the transfer of data with malformed security attribute metadata structures. |
☐ | SV-68739r1_rule | The ALG that is part of a CDS must enforce organization-defined one-way information flows using hardware mechanisms. |
☐ | SV-68741r1_rule | The ALG that is part of a CDS must enforce information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows. |
☐ | SV-68743r1_rule | The ALG that is part of a CDS must enforce the use of human reviews for organization-defined information flows under organization-defined conditions. |
☐ | SV-68745r1_rule | The ALG must not have unnecessary services and functions enabled. |
☐ | SV-68747r1_rule | The ALG must be configured to remove or disable unrelated or unneeded application proxy services. |
☐ | SV-68749r1_rule | The ALG must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. |
☐ | SV-68751r1_rule | The ALG providing user authentication intermediary services must require users to re-authenticate when organization-defined circumstances or situations require re-authentication. |
☐ | SV-68753r1_rule | The ALG providing user access control intermediary services must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate user account access authorizations and privileges. |
☐ | SV-68755r1_rule | The ALG providing user authentication intermediary services must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users). |
☐ | SV-68757r1_rule | The ALG providing user authentication intermediary services must restrict user authentication traffic to specific authentication server(s). |
☐ | SV-68759r2_rule | The ALG providing user authentication intermediary services must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access. |
☐ | SV-68761r1_rule | The ALG providing user authentication intermediary services must implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access. |
☐ | SV-68767r1_rule | The ALG providing user authentication intermediary services must use multifactor authentication for network access to non-privileged accounts. |
☐ | SV-68769r2_rule | The ALG providing user authentication intermediary services must implement replay-resistant authentication mechanisms for network access to non-privileged accounts. |
☐ | SV-68771r1_rule | The ALG providing user authentication intermediary services must transmit only encrypted representations of passwords. |
☐ | SV-68773r1_rule | The ALG must prohibit the use of cached authenticators after an organization-defined time period. |
☐ | SV-68775r1_rule | The ALG providing user authentication intermediary services using PKI-based user authentication must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. |
☐ | SV-68777r1_rule | The ALG that provides intermediary services for TLS must validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation. |
☐ | SV-68779r1_rule | The ALG providing PKI-based user authentication intermediary services must map authenticated identities to the user account. |
☐ | SV-68781r1_rule | The ALG providing user authentication intermediary services must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users). |
☐ | SV-68789r1_rule | The ALG providing user authentication intermediary services must conform to FICAM-issued profiles. |
☐ | SV-68791r1_rule | The ALG must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity. |
☐ | SV-68793r1_rule | The ALG providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes. |
☐ | SV-68795r1_rule | The ALG providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures. |
☐ | SV-68797r1_rule | The ALG providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services. |
☐ | SV-68855r1_rule | The ALG must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment. |
☐ | SV-68857r1_rule | The ALG providing content filtering must block or restrict detected prohibited mobile code. |
☐ | SV-68859r1_rule | The ALG providing content filtering must prevent the download of prohibited mobile code. |
☐ | SV-68861r1_rule | The ALG must protect the authenticity of communications sessions. |
☐ | SV-68863r1_rule | The ALG must invalidate session identifiers upon user logout or other session termination. |
☐ | SV-68865r1_rule | The ALG must recognize only system-generated session identifiers. |
☐ | SV-68867r1_rule | The ALG must generate unique session identifiers using a FIPS 140-2 approved random number generator. |
☐ | SV-68869r1_rule | The ALG providing user authentication intermediary services using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of protected sessions. |
☐ | SV-68871r1_rule | In the event of a system failure of the ALG function, the ALG must save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted. |
☐ | SV-68873r1_rule | The ALG must implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks. |
☐ | SV-68875r1_rule | The ALG providing content filtering must protect against known and unknown types of Denial of Service (DoS) attacks by employing rate-based attack prevention behavior analysis. |
☐ | SV-68877r1_rule | The ALG providing content filtering must protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing pattern recognition pre-processors. |
☐ | SV-68879r1_rule | The ALG providing content filtering must protect against known types of Denial of Service (DoS) attacks by employing signatures. |
☐ | SV-68881r1_rule | The ALG providing content filtering must block outbound traffic containing known and unknown DoS attacks to protect against the use of internal information systems to launch any Denial of Service (DoS) attacks against other networks or endpoints. |
☐ | SV-68883r1_rule | The ALG must only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations. |
☐ | SV-68885r1_rule | The ALG must fail securely in the event of an operational failure. |
☐ | SV-68887r1_rule | The ALG must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception). |
☐ | SV-68889r1_rule | The ALG must identify and log internal users associated with denied outgoing communications traffic posing a threat to external information systems. |
☐ | SV-68891r1_rule | The ALG must check the validity of all data inputs except those specifically identified by the organization. |
☐ | SV-68893r1_rule | The ALG must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. |
☐ | SV-68895r1_rule | The ALG must generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries. |
☐ | SV-68897r1_rule | The ALG must reveal error messages only to the ISSO, ISSM, and SCA. |
☐ | SV-68899r1_rule | The ALG providing content filtering must automatically update malicious code protection mechanisms. |
☐ | SV-68901r1_rule | The ALG providing content filtering must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures. |
☐ | SV-68903r1_rule | The ALG providing content filtering must be configured to perform real-time scans of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed. |
☐ | SV-68905r1_rule | The ALG providing content filtering must block malicious code upon detection. |
☐ | SV-68907r1_rule | The ALG providing content filtering must delete or quarantine malicious code in response to malicious code detection. |
☐ | SV-68909r1_rule | The ALG providing content filtering must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection. |
☐ | SV-68911r1_rule | The ALG providing content filtering must be configured to integrate with a system-wide intrusion detection system. |
☐ | SV-68913r1_rule | The ALG providing content filtering must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum. |
☐ | SV-68915r1_rule | The ALG providing content filtering must generate a log record when unauthorized network services are detected. |
☐ | SV-68917r1_rule | The ALG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected. |
☐ | SV-68919r1_rule | The ALG providing content filtering must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions. |
☐ | SV-68921r1_rule | The ALG providing content filtering must continuously monitor outbound communications traffic crossing internal security boundaries for unusual/unauthorized activities or conditions. |
☐ | SV-68923r1_rule | The ALG providing content filtering must send an alert to, at a minimum, the ISSO and ISSM when detection events occur. |
☐ | SV-68925r1_rule | The ALG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected. |
☐ | SV-68927r1_rule | The ALG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when root level intrusion events which provide unauthorized privileged access are detected. |
☐ | SV-68929r1_rule | The ALG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when user level intrusions which provide non-privileged access are detected. |
☐ | SV-68931r1_rule | The ALG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected. |
☐ | SV-68933r1_rule | The ALG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting
DoD systems or malicious code adversely affecting the operations and/or security
of DoD systems is detected. |
☐ | SV-68935r1_rule | The ALG that implements spam protection mechanisms must be updated automatically. |
☐ | SV-69007r1_rule | The ALG must generate audit records when successful/unsuccessful attempts to delete security objects occur. |
☐ | SV-69009r1_rule | The ALG must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur. |
☐ | SV-69011r1_rule | The ALG providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system. |
☐ | SV-69013r1_rule | The ALG providing user access control intermediary services must provide the capability for authorized users to select a user session to capture or view. |
☐ | SV-69015r1_rule | The ALG providing user access control intermediary services must provide the capability for authorized users to capture, record, and log all content related to a selected user session. |
☐ | SV-69017r1_rule | To protect against data mining, the ALG providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. |
☐ | SV-69019r1_rule | The ALG must fail to a secure state upon failure of initialization, shutdown, or abort actions. |
☐ | SV-70443r1_rule | The ALG providing user access control intermediary services must conceal, via the session lock, information previously visible on the display with a publicly viewable image. |
☐ | SV-70445r1_rule | The ALG providing user access control intermediary services must initiate a session lock after a 15-minute period of inactivity. |
☐ | SV-70447r1_rule | The ALG providing user access control intermediary services must provide the capability for users to directly initiate a session lock. |
☐ | SV-70449r1_rule | The ALG providing user access control intermediary services must retain the session lock until the user reestablishes access using established identification and authentication procedures. |
☐ | SV-70451r1_rule | The ALG providing user access control intermediary services must automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur. |
☐ | SV-70453r1_rule | The ALG providing user access control intermediary services must provide a logoff capability for user-initiated communications sessions. |
☐ | SV-70455r1_rule | The ALG providing user access control intermediary services must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions. |
☐ | SV-70457r1_rule | The ALG that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys. |