UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The ALG providing network user proxy services must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate each user access authorization and privileges.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000512-ALG-000063 SRG-NET-000512-ALG-000063 SRG-NET-000512-ALG-000063_rule Medium
Description
User account and privilege validation must be centralized in order to prevent unauthorized access using changed or revoked privileges. ALGs can implement functions such as traffic filtering, authentication, access, and authorization functions based on computer and user privileges. However, the directory service (e.g., Active Directory or LDAP) must not be installed on the ALG, particularly if the gateway resides on the untrusted zone of the Enclave.
STIG Date
Application Layer Gateway Security Requirements Guide 2014-06-27

Details

Check Text ( C-SRG-NET-000512-ALG-000063_chk )
If the ALG does not provide network user proxy services, this is not a finding.

Verify the ALG is configured with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges.

If the ALG is not configured with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges, this is not a finding.
Fix Text (F-SRG-NET-000512-ALG-000063_fix)
Configure the ALG with a pre-established trust relationship and mechanisms with appropriate authorities which validate each user access authorization and privileges.