UCF STIG Viewer Logo

A10 Networks ADC ALG Security Technical Implementation Guide


Overview

Date Finding Count (33)
2021-03-25 CAT I (High): 3 CAT II (Med): 26 CAT III (Low): 4
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-237049 High The A10 Networks ADC must protect against TCP and UDP Denial of Service (DoS) attacks by employing Source-IP based connection-rate limiting.
V-237062 High The A10 Networks ADC must protect against ICMP-based Denial of Service (DoS) attacks by employing ICMP Rate Limiting.
V-237064 High The A10 Networks ADC must be a FIPS-compliant version.
V-237038 Medium The A10 Networks ADC when used for TLS encryption and decryption must validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.
V-237039 Medium The A10 Networks ADC must not have any unnecessary or unapproved virtual servers configured.
V-237032 Medium The A10 Networks ADC, when used for TLS encryption and decryption, must be configured to comply with the required TLS settings in NIST SP 800-52.
V-237036 Medium The A10 Networks ADC must use DNS Proxy mode when Global Server Load Balancing is used.
V-237037 Medium The A10 Networks ADC must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.
V-237035 Medium The A10 Networks ADC must not have unnecessary scripts installed.
V-237058 Medium The A10 Networks ADC must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
V-237048 Medium The A10 Networks ADC being used for TLS encryption and decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions.
V-237050 Medium The A10 Networks ADC must implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.
V-237051 Medium The A10 Networks ADC must enable DDoS filters.
V-237052 Medium The A10 Networks ADC, when used to load balance web applications, must examine incoming user requests against the URI White Lists.
V-237054 Medium The A10 Networks ADC must enable logging for packet anomaly events.
V-237055 Medium The A10 Networks ADC must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.
V-237056 Medium The A10 Networks ADC must enable logging of Denial of Service (DoS) attacks.
V-237057 Medium The A10 Networks ADC, when used for load-balancing web servers, must not allow the HTTP TRACE and OPTIONS methods.
V-237061 Medium If the Data Owner requires it, the A10 Networks ADC must be configured to perform CCN Mask, SSN Mask, and PCRE Mask Request checks.
V-237060 Medium The A10 Networks ADC, when used for load balancing web servers, must deploy the WAF in active mode.
V-237063 Medium The A10 Networks ADC must protect against TCP SYN floods by using TCP SYN Cookies.
V-237043 Medium To protect against data mining, the A10 Networks ADC must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
V-237042 Medium To protect against data mining, the A10 Networks ADC must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
V-237041 Medium The A10 Networks ADC, when used to load balance web applications, must replace response codes.
V-237040 Medium The A10 Networks ADC, when used to load balance web applications, must strip HTTP response headers.
V-237047 Medium To protect against data mining, the A10 Networks ADC providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.
V-237046 Medium To protect against data mining, the A10 Networks ADC providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
V-237045 Medium To protect against data mining, the A10 Networks ADC providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
V-237044 Medium To protect against data mining, the A10 Networks ADC providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
V-237033 Low The A10 Networks ADC, when used to load balance web applications, must enable external logging for accessing Web Application Firewall data event messages.
V-237034 Low The A10 Networks ADC must send an alert to, at a minimum, the ISSO and SCA when connectivity to the Syslog servers is lost.
V-237059 Low The A10 Networks ADC must, at a minimum, off-load audit log records onto a centralized log server.
V-237053 Low The A10 Networks ADC, when used to load balance web applications, must enable external logging for WAF data event messages.