{
"stig": {
"date": "2020-09-28",
"description": "This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.",
"findings": {
"V-215738": {
"checkid": "C-16930r291027_chk",
"checktext": "If the BIG-IP Core does not provide user access control intermediary services for virtual servers, this is not applicable.\n\nWhen user access control intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to enforce approved authorizations for logical access to information and system resources employing identity-based, role-based, and/or attribute-based security policies.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section, that \"Access Policy\" has been set to use an access policy to enforce approved authorizations for logical access to information.\n\nIf the BIG-IP Core is not configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies, this is a finding.",
"description": "Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authorization-based access control could result in the immediate compromise and unauthorized access to sensitive information. All DoD systems must be properly configured to incorporate access control methods that do not rely solely on authentication for authorized access.\n\nAuthorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset. Information systems use access control policies and enforcement mechanisms to implement this requirement. Authorization procedures and controls must be implemented to ensure each authenticated entity also has a validated and current authorization.\n\nAccess control policies include identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include access control lists, access control matrices, and cryptography. \n\nALGs must use these policies and mechanisms to control access on behalf of the application for which it is acting as intermediary and access control mechanisms are required.",
"fixid": "F-16928r291028_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core as follows: \n\nConfigure a policy in the BIG-IP APM module to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.\n\nApply the APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.",
"iacontrols": null,
"id": "V-215738",
"ruleID": "SV-215738r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.",
"version": "F5BI-LT-000003"
},
"V-215739": {
"checkid": "C-16931r291030_chk",
"checktext": "If the BIG-IP Core does not perform packet-filtering intermediary services for virtual servers, this is not applicable.\n\nWhen packet-filtering intermediary services are performed, verify the BIG-IP Core is configured as follows:\n\nVerify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an AFM policy to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Network Firewall\" Enforcement is set to \"Policy Rules...\" and \"Policy\" is set to use an AFM policy to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.\n\nIf the BIG-IP Core is not configured to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic, this is a finding.",
"description": "Information flow control regulates where information is allowed to travel within a network. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data.\n\nInformation flow control policies and enforcement mechanisms are commonly employed by organizations to control the flow of information between designated sources and destinations (e.g., networks, individuals, devices) within information systems. Examples of information flow control restrictions include keeping export-controlled information from being transmitted in the clear to the Internet or blocking information marked as classified but being transported to an unapproved destination.\n\nALGs enforce approved authorizations by employing security policy and/or rules that restrict information system services, provide packet-filtering capability based on header or protocol information, and/or message filtering capability based on data content (e.g., implementing key word searches or using document characteristics).",
"fixid": "F-16929r291031_fix",
"fixtext": "If user packet-filtering intermediary services are provided, configure the BIG-IP Core as follows: \n\nConfigure a policy in the BIG-IP Advanced Firewall Manager (AFM) module to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of source, destination, headers, and/or content of the communications traffic.\n\nApply the AFM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to enforce approved authorizations for controlling the flow of information within the network.",
"iacontrols": null,
"id": "V-215739",
"ruleID": "SV-215739r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.",
"version": "F5BI-LT-000005"
},
"V-215740": {
"checkid": "C-16932r291033_chk",
"checktext": "If the BIG-IP Core does not perform packet-filtering intermediary services for virtual servers, this is not applicable.\n\nWhen packet-filtering intermediary services are performed, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module is configured with an AFM policy to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Network Firewall\" Enforcement is set to \"Policy Rules...\" and \"Policy\" is set to use an AFM policy to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.\n\nIf the BIG-IP Core is not configured to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic, this is a finding.",
"description": "Information flow control regulates where information is allowed to travel within a network and between interconnected networks. Blocking or restricting detected harmful or suspicious communications between interconnected networks enforces approved authorizations for controlling the flow of traffic.\n\nThis requirement applies the Application Layer Gateway (ALG) when used as a gateway or boundary device that allows traffic flow between interconnected networks of differing security policies.\n\nThe ALG is installed and configured in such a way that it restricts or blocks information flows based on guidance in the Ports, Protocols, and Services Management (PPSM) regarding restrictions for boundary crossing for ports, protocols and services. Information flow restrictions may be implemented based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.\n\nThe ALG must be configured with policy filters (e.g., security policy, rules, and/or signatures) that restrict or block information system services; provide a packet-filtering capability based on header information; and/or perform message filtering based on message content. The policy filters used depend upon the type of application gateway (e.g., web, email, or TLS).",
"fixid": "F-16930r291034_fix",
"fixtext": "If user packet-filtering intermediary services are provided, configure the BIG-IP Core as follows: \n\nConfigure a policy in the BIG-IP AFM module to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.\n\nApply the AFM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks.",
"iacontrols": null,
"id": "V-215740",
"ruleID": "SV-215740r557356_rule",
"severity": "high",
"title": "The BIG-IP Core implementation must be configured to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.",
"version": "F5BI-LT-000007"
},
"V-215741": {
"checkid": "C-16933r291036_chk",
"checktext": "If the BIG-IP Core does not provide user access control intermediary services for virtual servers, this is not applicable.\n\nWhen user access control intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the virtual servers.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section, that \"Access Policy\" has been set to use an access policy to display the Standard Mandatory DoD-approved Notice and Consent Banner.\n\nIf the BIG-IP Core is not configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the virtual servers, this is a finding.",
"description": "Display of a standardized and approved use notification before granting access to the virtual servers ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.\n\nSystem use notifications are required only for access via logon interfaces with human users and are not required when such human interfaces do not exist. This requirement applies to network elements that have the concept of a user account and have the logon function residing on the network element.\n\nThe banner must be formatted in accordance with DTM-08-060. Use the following verbiage for network elements that can accommodate banners of 1300 characters:\n\n\"You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only.\n\nBy using this IS (which includes any device attached to this IS), you consent to the following conditions:\n\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\n\n-At any time, the USG may inspect and seize data stored on this IS.\n\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\n\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\n\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.\"\n\nUse the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner:\n\n\"I've read & consent to terms in IS user agreem't.\"\n\nThis policy only applies to ALGs (e.g., identity management or authentication gateways) that provide user account services as part of the intermediary services.",
"fixid": "F-16931r291037_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core as follows: \n\nConfigure a policy in the BIG-IP APM module to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the virtual servers. \n\nApply the APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the virtual servers.",
"iacontrols": null,
"id": "V-215741",
"ruleID": "SV-215741r557356_rule",
"severity": "low",
"title": "The BIG-IP Core implementation must be configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to virtual servers.",
"version": "F5BI-LT-000023"
},
"V-215742": {
"checkid": "C-16934r291039_chk",
"checktext": "If the BIG-IP Core does not provide user access control intermediary services for virtual servers, this is not applicable.\n\nWhen user access control intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section, that \"Access Policy\" has been set to use an access policy to retain the Standard Mandatory DoD-approved Notice and Consent Banner.\n\nIf the BIG-IP Core is not configured to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access, this is a finding.",
"description": "The banner must be acknowledged by the user prior to allowing the user access to virtual servers. This provides assurance that the user has seen the message and accepted the conditions for access. If the consent banner is not acknowledged by the user, DoD will not be in compliance with system use notifications required by law.\n\nTo establish acceptance of the application usage policy, a click-through banner at application logon is required. The network element must prevent further activity until the user executes a positive action to manifest agreement by clicking on a box indicating \"OK\".\n\nThis policy only applies to gateways (e.g., identity management or authentication gateways) that provide user account services as part of the intermediary services.",
"fixid": "F-16932r291040_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP APM module to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. \n\nApply the APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.",
"iacontrols": null,
"id": "V-215742",
"ruleID": "SV-215742r557356_rule",
"severity": "low",
"title": "The BIG-IP Core implementation must be configured to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users accessing virtual servers acknowledge the usage conditions and take explicit actions to log on for further access.",
"version": "F5BI-LT-000025"
},
"V-215743": {
"checkid": "C-16935r291042_chk",
"checktext": "If the BIG-IP Core does not provide user access control intermediary services for virtual servers, this is not applicable.\n\nWhen user access control intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to publicly accessible applications.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section, that \"Access Policy\" has been set to use an access policy to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to publicly accessible applications.\n\nIf the BIG-IP Core is not configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the publicly accessible systems, this is a finding.",
"description": "Display of a standardized and approved use notification before granting access to the publicly accessible network element ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.\n\nSystem use notifications are required only for access via logon interfaces with human users and are not required when such human interfaces do not exist. This requirement applies to network elements that have the concept of a user account and have the logon function residing on the network element.\n\nThe banner must be formatted in accordance with DTM-08-060. Use the following verbiage for network elements that can accommodate banners of 1300 characters:\n\n\"You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only.\n\nBy using this IS (which includes any device attached to this IS), you consent to the following conditions:\n\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\n\n-At any time, the USG may inspect and seize data stored on this IS.\n\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\n\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\n\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.\"\n\nUse the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner:\n\n\"I've read & consent to terms in IS user agreem't.\"\n\nThis policy only applies to gateways (e.g., identity management or authentication gateways) that provide user account services as part of the intermediary services off-loaded from the application. Publicly accessed systems are used in DoD to provide benefit information, pay information, or public services. There may also be self-registration and authorization services provided by these gateways.",
"fixid": "F-16933r291043_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core as follows:\n\nConfigure a policy in the APM module to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to publicly accessible applications.\n\nApply the APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to publicly accessible applications.",
"iacontrols": null,
"id": "V-215743",
"ruleID": "SV-215743r557356_rule",
"severity": "low",
"title": "The BIG-IP Core implementation must be configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to publicly accessible applications.",
"version": "F5BI-LT-000027"
},
"V-215744": {
"checkid": "C-16936r291045_chk",
"checktext": "If the BIG-IP Core does not provide user access control intermediary services for virtual servers, this is not applicable.\n\nWhen user access control intermediary services are provided, verify the BIG-IP Core limits the number of concurrent sessions to an organization-defined number for virtual servers.\n\nReview organizational Standard Operating Procedures (SOP) to ensure there is an organization-defined threshold for the maximum number of concurrent session for each application the BIG-IP Core serves as intermediary.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect a Virtual Server from the list to verify that the connection limit is set.\n\nSelect \"Advanced\" for \"Configuration\".\n\nReview the following under the \"Configuration\" section.\n\nVerify that 'Connection Limit' is set to the organization-defined number of concurrent connections and not set to zero (0).\n\nVerify that \"Connection Rate Limit\" is set to the organization-defined number of concurrent connections per second and not set to zero (0).\n\nIf the BIG-IP Core is not configured to limit the number of concurrent sessions to an organization-defined number or is set to zero (0) for virtual servers, this is a finding.",
"description": "Network element management includes the ability to control the number of users and user sessions that utilize a network element. Limiting the number of current sessions per user is helpful in limiting risks related to DoS attacks.\n\nThis requirement addresses concurrent sessions for information system accounts and does not address concurrent sessions by single users via multiple system accounts. \n\nThe organization-defined number of concurrent sessions must be the same as the requirements specified for the application for which it serves as intermediary.\n\nThis policy only applies to application gateways/firewalls (e.g., identity management or authentication gateways) that provide user account services as part of the intermediary services.",
"fixid": "F-16934r291046_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core as follows:\n\nConfigure the appropriate Virtual Server(s) in the BIG-IP LTM module to limit concurrent sessions to the organization-defined number for virtual servers.",
"iacontrols": null,
"id": "V-215744",
"ruleID": "SV-215744r557356_rule",
"severity": "high",
"title": "The BIG-IP Core implementation must be configured to limit the number of concurrent sessions to an organization-defined number for virtual servers.",
"version": "F5BI-LT-000029"
},
"V-215745": {
"checkid": "C-16937r291048_chk",
"checktext": "If the BIG-IP Core does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS, and webmail) for virtual servers, this is not applicable.\n\nWhen intermediary services for remote access communications traffic are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an ASM policy to inspect traffic or forward to a monitoring device for inspection prior to forwarding to inbound destinations.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Application Security Policy\" is Enabled and \"Policy\" is set to use an ASM policy to monitor inbound traffic for remote access policy compliance when accepting remote access connections to virtual servers.\n\nIf the BIG-IP Core is not configured to monitor inbound traffic for compliance with remote access security policies, this is a finding.",
"description": "Automated monitoring of remote access traffic allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by inspecting connection activities of remote access capabilities.\n\nA remote access policy establishes and documents usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed prior to allowing connections to the information systems.\n\nRemote access methods include both unencrypted and encrypted traffic (e.g., web portals, web content filter, TLS, and webmail). With inbound TLS inspection, the traffic must be inspected prior to being allowed on the enclave's web servers hosting TLS or HTTPS applications. With outbound traffic inspection, traffic must be inspected prior to being forwarded to destinations outside of the enclave, such as external email traffic.",
"fixid": "F-16935r291049_fix",
"fixtext": "If intermediary services for remote access communications traffic are provided, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP ASM module to monitor inbound traffic for remote access policy compliance.\n\nApply policy to the applicable Virtual Server(s) in the BIG-IP LTM module to monitor inbound traffic for remote access policy compliance when accepting connections to virtual servers.",
"iacontrols": null,
"id": "V-215745",
"ruleID": "SV-215745r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to monitor inbound traffic for remote access policy compliance when accepting connections to virtual servers.",
"version": "F5BI-LT-000031"
},
"V-215746": {
"checkid": "C-16938r513221_chk",
"checktext": "If the BIG-IP Core does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS, and webmail) for virtual servers, this is not applicable.\n\nWhen intermediary services for remote access communications are provided, verify the BIG-IP Core is configured to use encryption services that implement NIST SP 800-52 Revision 2 compliant cryptography to protect the confidentiality of connections to virtual servers.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Profiles >> SSL >> Client\n\nVerify a profile exists that is FIPS compliant.\n\nSelect FIPS-compliant profile.\n\nVerify \"Ciphers\" under \"Configuration\" section is configured to use FIPS-compliant ciphers.\n\nVerify the BIG-IP Core is configured to use a FIPS-compliant profile:\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Configuration\" section, that FIPS-compliant profile is in the \"Selected\" area for \"SSL Profile (Client)\".\n\nIf the BIG-IP Core is not configured to use encryption services that implement NIST SP 800-52 Revision 1 compliant cryptography to protect the confidentiality of connections to virtual servers, this is a finding.",
"description": "Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session.\n\nRemote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include broadband and wireless connections. Remote access methods include, for example, proxied remote encrypted traffic (e.g., TLS gateways, web content filters, and webmail proxies).\n\nEncryption provides a means to secure the remote connection so as to prevent unauthorized access to the data traversing the remote access connection, thereby providing a degree of confidentiality. The encryption strength of the mechanism is selected based on the security categorization of the information.\n\nThis requirement applies to ALGs providing remote access proxy services as part of their intermediary services (e.g., OWA or TLS gateway).",
"fixid": "F-16936r513222_fix",
"fixtext": "If intermediary services for remote access communications traffic are provided, configure the BIG-IP Core to use encryption services that implement NIST SP 800-52 Revision 2 compliant cryptography to protect the confidentiality of connections to virtual servers.",
"iacontrols": null,
"id": "V-215746",
"ruleID": "SV-215746r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to use encryption services that implement NIST SP 800-52 Revision 2 compliant cryptography to protect the confidentiality of connections to virtual servers.",
"version": "F5BI-LT-000033"
},
"V-215747": {
"checkid": "C-16939r291054_chk",
"checktext": "If the BIG-IP Core does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS) for virtual servers, this is not applicable.\n\nWhen intermediary services for TLS are provided, verify the BIG-IP Core is configured to implement the applicable required TLS settings in NIST PUB SP 800-52 Revision 1.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Profiles >> SSL >> Client\n\nVerify a profile exists that is FIPS compliant.\n\nSelect FIPS-compliant profile.\n\nSelect \"Advanced\" next to \"Configuration\".\n\nVerify \"Ciphers\" under \"Configuration\" section is configured to use FIPS-compliant ciphers.\n\nVerify the BIG-IP Core is configured to use FIPS-compliant server profile:\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Configuration\" section, that the FIPS-compliant profile is in the \"Selected\" area for \"SSL Profile (Client)\".\n\nIf the BIG-IP Core is not configured to implement the applicable required TLS settings in NIST PUB SP 800-52 Revision 1, this is a finding.",
"description": "NIST SP 800-52 Revision 1 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol.\n\nThis requirement applies to TLS gateways (also known as SSL gateways) and is not applicable to VPN devices. Application protocols such as HTTPS and DNSSEC use TLS/SSL as the underlying security protocol and thus are in scope for this requirement. NIST SP 800-52 Revision 1 provides guidance.\n\nNIST SP 800-52 Revision 1 sets TLS version 1.1 as a minimum version, thus all versions of SSL are not allowed (including for client negotiation) either on DoD-only or on public facing servers.",
"fixid": "F-16937r291055_fix",
"fixtext": "If intermediary services for TLS are provided, configure the BIG-IP Core to comply with applicable required TLS settings in NIST PUB SP 800-52 Revision 1.",
"iacontrols": null,
"id": "V-215747",
"ruleID": "SV-215747r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to comply with the required TLS settings in NIST SP 800-52 Revision 1 for TLS services to virtual servers.",
"version": "F5BI-LT-000035"
},
"V-215748": {
"checkid": "C-16940r291057_chk",
"checktext": "If the BIG-IP Core does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS gateways, and webmail proxy views) for virtual servers, this is not applicable.\n\nWhen intermediary services for remote access communication traffic are provided, verify the BIG-IP Core uses NIST SP 800-52 Revision 1 compliant cryptography to protect the integrity of remote access sessions to virtual servers.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Configuration\" section, that a FIPS-compliant profile is in the \"Selected\" area for \"SSL Profile (Client)\" and \"SSL Profile (Server)\".\n\nIf the BIG-IP Core is not configured to use NIST SP 800-52 Revision 1 compliant cryptography to protect the integrity of remote access sessions, this is a finding.",
"description": "Without cryptographic integrity protections, information can be altered by unauthorized users without detection.\n\nRemote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include broadband and wireless connections. Remote access methods include, for example, proxied remote encrypted traffic (e.g., TLS gateways, web content filters, and webmail proxies).\n\nCryptographic mechanisms used for protecting the integrity of information include, for example, signed hash functions using asymmetric cryptography enabling distribution of the public key to verify the hash information while maintaining the confidentiality of the secret key used to generate the hash.\n\nThis requirement applies to ALGs providing remote access proxy services as part of their intermediary services (e.g., OWA or TLS gateway).",
"fixid": "F-16938r291058_fix",
"fixtext": "If intermediary services for remote access communications traffic are provided, configure the BIG-IP Core to use NIST SP 800-52 Revision 1 compliant cryptography to protect the integrity of remote access sessions to virtual servers.",
"iacontrols": null,
"id": "V-215748",
"ruleID": "SV-215748r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to use NIST SP 800-52 Revision 1 compliant cryptography to protect the integrity of remote access sessions to virtual servers.",
"version": "F5BI-LT-000037"
},
"V-215749": {
"checkid": "C-16941r291060_chk",
"checktext": "Verify the BIG-IP Core is configured to protect audit information from unauthorized read access.\n\nNavigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options.\n\nUnder 'Log Access', verify unauthorized roles are set to 'Deny'.\n\nIf the BIG-IP Core is not configured to protect audit information from unauthorized read access, this is a finding.",
"description": "Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. Thus, it is imperative that the collected log data from the various network elements, as well as the auditing tools, be secured and can only be accessed by authorized personnel.",
"fixid": "F-16939r291061_fix",
"fixtext": "Configure the BIG-IP Core to protect audit information from unauthorized read access.",
"iacontrols": null,
"id": "V-215749",
"ruleID": "SV-215749r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to protect audit information from unauthorized read access.",
"version": "F5BI-LT-000055"
},
"V-215750": {
"checkid": "C-16942r291063_chk",
"checktext": "Verify the BIG-IP Core is configured to protect audit information from unauthorized modification.\n\nNavigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options.\n\nUnder 'Log Access', verify unauthorized roles are set to 'Deny'.\n\nIf the BIG-IP Core is not configured to protect audit information from unauthorized modification, this is a finding.",
"description": "If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve.\n\nTo ensure the veracity of audit data, the information system and/or the application must protect audit information from unauthorized modification.\n\nThis requirement can be achieved through multiple methods, which will depend upon system architecture and design. Some commonly employed methods include ensuring log files receive the proper file system permissions and limiting log data locations.\n\nAudit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity.\n\nThis does not apply to audit logs generated on behalf of the device itself (management).",
"fixid": "F-16940r291064_fix",
"fixtext": "Configure the BIG-IP Core to protect audit information from unauthorized modification.",
"iacontrols": null,
"id": "V-215750",
"ruleID": "SV-215750r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to protect audit information from unauthorized modification.",
"version": "F5BI-LT-000057"
},
"V-215751": {
"checkid": "C-16943r291066_chk",
"checktext": "Verify the BIG-IP Core is configured to protect audit information from unauthorized deletion.\n\nNavigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options.\n\nUnder 'Log Access', verify unauthorized roles are set to 'Deny'.\n\nIf the BIG-IP Core is not configured to protect audit information from unauthorized deletion, this is a finding.",
"description": "If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve.\n\nTo ensure the veracity of audit data, the information system and/or the application must protect audit information from unauthorized modification. This requirement can be achieved through multiple methods, which will depend upon system architecture and design. Some commonly employed methods include ensuring log files receive the proper file system permissions, and limiting log data locations.\n\nAudit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity.\n\nThis requirement does not apply to audit logs generated on behalf of the device itself (device management).",
"fixid": "F-16941r291067_fix",
"fixtext": "Configure the BIG-IP Core to protect audit information from unauthorized deletion.",
"iacontrols": null,
"id": "V-215751",
"ruleID": "SV-215751r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to protect audit information from unauthorized deletion.",
"version": "F5BI-LT-000059"
},
"V-215752": {
"checkid": "C-16944r291069_chk",
"checktext": "Verify the BIG-IP Core is configured to protect audit tools from unauthorized access.\n\nNavigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options.\n\nUnder 'Log Access', verify unauthorized roles are set to 'Deny'.\n\nIf the BIG-IP Core is not configured to protect audit tools from unauthorized access, this is a finding.",
"description": "Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit data.\n\nNetwork elements providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the access to audit tools.\n\nAudit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.\n\nThis does not apply to audit logs generated on behalf of the device itself (management).",
"fixid": "F-16942r291070_fix",
"fixtext": "Configure the BIG-IP Core to protect audit tools from unauthorized access.",
"iacontrols": null,
"id": "V-215752",
"ruleID": "SV-215752r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to protect audit tools from unauthorized access.",
"version": "F5BI-LT-000061"
},
"V-215753": {
"checkid": "C-16945r291072_chk",
"checktext": "Verify the BIG-IP Core is configured to protect audit tools from unauthorized modification.\n\nNavigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options.\n\nUnder 'Log Access', verify unauthorized roles are set to 'Deny'.\n\nIf the BIG-IP Core is not configured to protect audit tools from unauthorized modification, this is a finding.",
"description": "Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit data.\n\nNetwork elements providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the modification of audit tools.\n\nAudit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.\n\nThis does not apply to audit logs generated on behalf of the device itself (management).",
"fixid": "F-16943r291073_fix",
"fixtext": "Configure the BIG-IP Core to protect audit tools from unauthorized modification.",
"iacontrols": null,
"id": "V-215753",
"ruleID": "SV-215753r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to protect audit tools from unauthorized modification.",
"version": "F5BI-LT-000063"
},
"V-215754": {
"checkid": "C-16946r291075_chk",
"checktext": "Verify the BIG-IP Core is configured to protect audit information from unauthorized read access.\n\nNavigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options.\n\nUnder 'Log Access', verify unauthorized roles are set to 'Deny'.\n\nIf the BIG-IP Core is not configured to protect audit information from unauthorized deletion, this is a finding.",
"description": "Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit data.\n\nNetwork elements providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the deletion of audit tools.\n\nAudit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.\n\nThis does not apply to audit logs generated on behalf of the device itself (management).",
"fixid": "F-16944r291076_fix",
"fixtext": "Configure the BIG-IP Core to protect audit tools from unauthorized deletion.",
"iacontrols": null,
"id": "V-215754",
"ruleID": "SV-215754r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to protect audit tools from unauthorized deletion.",
"version": "F5BI-LT-000065"
},
"V-215755": {
"checkid": "C-16947r291078_chk",
"checktext": "Review the BIG-IP Core configuration to determine if functions, ports, protocols, and/or services not required for operation, or not related to BIG-IP Core functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nReview the Virtual Service List and validate all ports listed in the \"Service Port\" column are documented for each virtual server and are required for operation.\n\nIf unnecessary services and functions are enabled on the BIG-IP Core, this is a finding.\n\nIf the BIG-IP Core implementation is configured with functions, ports, protocols, and/or services that are not documented for the server/application for which the virtual servers are providing connectivity, this is a finding.",
"description": "Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of these functions and services are installed and enabled by default. The organization must determine which functions and services are required to perform the content filtering and other necessary core functionality for each component of the ALG. These unnecessary capabilities or services are often overlooked and therefore may remain unsecured. They increase the risk to the platform by providing additional attack vectors.\n\nThe primary function of an ALG is to provide application-specific content filtering and/or proxy services. The ALG application suite may integrate related content filtering and analysis services and tools (e.g., IPS, proxy, malware inspection, black/white lists). Some gateways may also include email scanning, decryption, caching, and DLP services. However, services and capabilities which are unrelated to this primary functionality must not be installed (e.g., DNS, email client or server, FTP server, or web server).\n\nNext Generation ALGs (NGFW) and Unified Threat Management (UTM) ALGs integrate functions which have been traditionally separated. These products integrate content filtering features to provide more granular policy filtering. There may be operational drawbacks to combining these services into one device. Another issue is that NGFW and UTM products vary greatly with no current definitive industry standard.",
"fixid": "F-16945r291079_fix",
"fixtext": "Configure Virtual Servers in the BIG-IP LTM module with only functions, ports, protocols, and/or services that are documented for the servers/applications for which the BIG-IP Core implementation is providing connectivity.",
"iacontrols": null,
"id": "V-215755",
"ruleID": "SV-215755r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured so that only functions, ports, protocols, and/or services that are documented for the server/application for which the virtual servers are providing connectivity.",
"version": "F5BI-LT-000067"
},
"V-215756": {
"checkid": "C-16948r291081_chk",
"checktext": "Review the BIG-IP Core configuration to determine if application proxies are installed that are not related to the purpose of the gateway.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nReview the Virtual Service List and validate there are only ports listed in the \"Service Port\" column that are providing proxy services related to the purpose of the BIG-IP Core.\n\nIf the BIG-IP Core has unrelated or unneeded application proxy services installed, this is a finding.",
"description": "Unrelated or unneeded proxy services increase the attack vector and add excessive complexity to the securing of the ALG. Multiple application proxies can be installed on many ALGs. However, proxy types must be limited to related functions. At a minimum, the web and email gateway represent different security domains/trust levels. Organizations should also consider separation of gateways that service the DMZ and the trusted network.",
"fixid": "F-16946r291082_fix",
"fixtext": "Configure Virtual Servers in the BIG-IP LTM module with only proxy services that are related to the purpose of the BIG-IP Core.",
"iacontrols": null,
"id": "V-215756",
"ruleID": "SV-215756r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to remove or disable any functions, ports, protocols, and/or services that are not documented as required.",
"version": "F5BI-LT-000069"
},
"V-215757": {
"checkid": "C-16949r291084_chk",
"checktext": "Review the BIG-IP Core to verify the minimum ports, protocols, and services that are required for operation of the BIG-IP Core are configured.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nCompare enabled ports, protocols, and/or services in the \"Service Port\" column with the PPSM and IAVM requirements.\n\nIf the BIG-IP Core is configured with ports, protocols, and/or services that are not required for operations or restricted by the PPSM, this is a finding.",
"description": "In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems.\n\nALGs are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. DoD continually assesses the ports, protocols, and services that can be used for network communications. Some ports, protocols, or services have known exploits or security weaknesses. Network traffic using these ports, protocols, and services must be prohibited or restricted in accordance with DoD policy. The ALG is a key network element for preventing these non-compliant ports, protocols, and services from causing harm to DoD information systems.\n\nThe network ALG must be configured to prevent or restrict the use of prohibited ports, protocols, and services throughout the network by filtering the network traffic and disallowing or redirecting traffic as necessary. Default and updated policy filters from the vendors will disallow older versions of protocols and applications and will address most known non-secure ports, protocols, and/or services. However, sources for further policy filters are the IAVMs and the PPSM requirements.",
"fixid": "F-16947r291085_fix",
"fixtext": "Configure Virtual Servers in the BIG-IP LTM module to use only ports, protocols, and/or services required for operation of the BIG-IP Core.",
"iacontrols": null,
"id": "V-215757",
"ruleID": "SV-215757r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocol, and Service Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.",
"version": "F5BI-LT-000071"
},
"V-215758": {
"checkid": "C-16950r291087_chk",
"checktext": "If the BIG-IP Core does not provide user authentication intermediary services for virtual servers, this is not applicable.\n\nWhen user authentication intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify the BIG-IP Core is configured with an APM policy to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section, that \"Access Policy\" has been set to use an APM access policy to uniquely identify and authenticate organizational users when connecting to virtual servers.\n\nIf the BIG-IP Core does not uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.",
"description": "To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system.\nOrganizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors). Organizational users (and any processes acting on behalf of users) must be uniquely identified and authenticated for all accesses except the following:\n\n1) Accesses explicitly identified and documented by the organization. Organizations document specific user actions that can be performed on the information system without identification or authentication.\n\n2) Accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity.\n\nThis requirement applies to ALGs that provide user proxy services, including identification and authentication. This service must use the site's directory service (e.g., Active Directory). Directory services must not be installed onto the gateway.",
"fixid": "F-16948r291088_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP APM module to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).\n\nApply the APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) when connecting to virtual servers.",
"iacontrols": null,
"id": "V-215758",
"ruleID": "SV-215758r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) when connecting to virtual servers.",
"version": "F5BI-LT-000073"
},
"V-215759": {
"checkid": "C-16951r291090_chk",
"checktext": "If the BIG-IP Core does not provide user access control intermediary services for virtual servers, this is not applicable.\n\nWhen user access control intermediary services are provided, verify the BIG-IP Core is configured an APM policy with a pre-established trust relationship and mechanisms with appropriate authorities that validate each user access authorization and privileges.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section, that \"Access Policy\" has been set to use an APM access policy that has been configured with a pre-established trust relationship and mechanisms with appropriate authorities that validate each user access authorization and privileges.\n\nIf the BIG-IP Core is not configured with a pre-established trust relationship and mechanisms with appropriate authorities that validate each user access authorization and privileges, this is a finding.",
"description": "User account and privilege validation must be centralized in order to prevent unauthorized access using changed or revoked privileges.\n\nALGs can implement functions such as traffic filtering, authentication, access, and authorization functions based on computer and user privileges. However, the directory service (e.g., Active Directory or LDAP) must not be installed on the ALG, particularly if the gateway resides on the untrusted zone of the Enclave.",
"fixid": "F-16949r291091_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core as follows: \n\nConfigure a policy in the BIG-IP APM module with a pre-established trust relationship and mechanisms with appropriate authorities that validate each user access authorization and privileges.\n\nApply the APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to validate user account access authorizations and privileges when providing access control to virtual servers.",
"iacontrols": null,
"id": "V-215759",
"ruleID": "SV-215759r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or authentication, authorization, and accounting (AAA) server) that validate user account access authorizations and privileges when providing access control to virtual servers.",
"version": "F5BI-LT-000075"
},
"V-215760": {
"checkid": "C-16952r291093_chk",
"checktext": "If the BIG-IP Core does not provide user authentication intermediary services for virtual servers, this is not applicable.\n\nWhen user authentication intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to use a specific authentication server(s).\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section that \"Access Policy\" has been set to use an APM access policy that has been configured with a pre-established trust relationship and mechanisms with appropriate authorities that validate each user access authorization and privileges.\n\nIf the BIG-IP Core provides user authentication intermediary services and does not restrict user authentication traffic to a specific authentication server(s), this is a finding.",
"description": "User authentication can be used as part of the policy filtering rule sets. Some URLs or network resources can be restricted to authenticated users only. Users are prompted by the application or browser for credentials. Authentication service may be provided by the ALG as an intermediary for the application; however, the authentication credential must be stored in the site's directory services server.\n\nThis requirement only applies to components where this is specific to the function of the device or has the concept of an organizational user (e.g., proxy capability). This does not apply to authentication for the purpose of configuring the device itself (i.e., device management).",
"fixid": "F-16950r291094_fix",
"fixtext": "If user authentication intermediary services are provided, configure the BIG-IP Core to use a specific authentication server(s) as follows: \n\nConfigure a policy in the BIG-IP APM module to use authentication for network access to non-privileged accounts.\n\nApply the APM policy to the applicable Virtual Server(s) in BIG-IP LTM module to restrict user authentication traffic to specific authentication server(s) when providing access control to virtual servers.",
"iacontrols": null,
"id": "V-215760",
"ruleID": "SV-215760r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation providing user authentication intermediary services must restrict user authentication traffic to specific authentication server(s) when providing access control to virtual servers.",
"version": "F5BI-LT-000077"
},
"V-215761": {
"checkid": "C-16953r291096_chk",
"checktext": "If the BIG-IP Core does not provide user authentication intermediary services for virtual servers, this is not applicable.\n\nWhen user authentication intermediary services, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to use multifactor authentication for network access to non-privileged accounts.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section, that \"Access Policy\" has been set to use an APM access policy that uses multifactor authentication for network access to non-privileged accounts when granting access to virtual servers.\n\nIf the BIG-IP Core provides user authentication intermediary services and does not use multifactor authentication for network access to non-privileged accounts, this is a finding.",
"description": "To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system.\n\nMultifactor authentication uses two or more factors to achieve authentication. Factors include: \n\n1) Something you know (e.g., password/PIN); \n2) Something you have (e.g., cryptographic, identification device, token); and \n3) Something you are (e.g., biometric).\n\nNon-privileged accounts are not authorized on the network element regardless of configuration.\n\nNetwork access is any access to an application by a user (or process acting on behalf of a user) where said access is obtained through a network connection.\n\nThe DoD CAC with DoD-approved PKI is an example of multifactor authentication.\n\nThis requirement applies to ALGs that provide user authentication intermediary services.",
"fixid": "F-16951r291097_fix",
"fixtext": "If user authentication intermediary services are provided, configure the BIG-IP Core as follows: \n\nConfigure a policy in the BIG-IP APM module to use multifactor authentication for network access to non-privileged accounts.\n\nApply APM policy to the applicable Virtual Server(s) in BIG-IP LTM module to use multifactor authentication for network access to non-privileged accounts when granting access to virtual servers.",
"iacontrols": null,
"id": "V-215761",
"ruleID": "SV-215761r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation providing user authentication intermediary services must use multifactor authentication for network access to non-privileged accounts when granting access to virtual servers.",
"version": "F5BI-LT-000079"
},
"V-215762": {
"checkid": "C-16954r291099_chk",
"checktext": "If the BIG-IP Core does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS) for virtual servers, this is not applicable.\n\nWhen intermediary services for TLS are provided, verify the BIG-IP Core is configured to validate certificates used for TLS functions by constructing a certification path to an accepted trust anchor.\n\nNavigate to the BIG-IP System manager >> Local traffic >> Profiles >> SSL >> Server.\n\nSelect a FIPS-compliant profile.\n\nReview the configuration under \"Server Authentication\" section.\n\nVerify \"Server Certificate\" is set to \"Required\".\n\nVerify \"Trusted Certificate Authorities\" is set to a DoD-approved CA bundle.\n\nIf the BIG-IP Core is not configured to validate certificates used for TLS functions by constructing a certification path to an accepted trust anchor, this is a finding.",
"description": "A trust anchor is an authoritative entity represented via a public key. Within a chain of trust, the top entity to be trusted is the \"root certificate\" or \"trust anchor\" such as a Certification Authority (CA). A certification path starts with the subject certificate and proceeds through a number of intermediate certificates up to a trusted root certificate, typically issued by a trusted CA. Path validation is necessary for a relying party to make an informed trust decision when presented with any certificate not already explicitly trusted.\n\nDeploying the ALG with TLS enabled may require the CA certificates for each proxy to be used for TLS traffic decryption/encryption. The installation of these certificates in each trusted root certificate store is used by proxied applications and browsers on each client.",
"fixid": "F-16952r291100_fix",
"fixtext": "If intermediary services for TLS are provided, configure the BIG-IP Core to validate certificates used for TLS functions by constructing a certification path with status information to an accepted trust anchor.",
"iacontrols": null,
"id": "V-215762",
"ruleID": "SV-215762r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to validate certificates used for TLS functions for connections to virtual servers by constructing a certification path (which includes status information) to an accepted trust anchor.",
"version": "F5BI-LT-000083"
},
"V-215763": {
"checkid": "C-16955r291102_chk",
"checktext": "If the BIG-IP Core does not provide PKI-based, user authentication intermediary services for virtual servers, this is not applicable.\n\nWhen PKI-based, user authentication intermediary services are provided, verify the BIG-IP LTM module is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to map the authenticated identity to the user account for PKI-based authentication.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section, that \"Access Policy\" has been set to use an APM access policy that maps the authenticated identity to the user account for PKI-based authentication to virtual servers.\n\nIf the BIG-IP Core does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.",
"description": "Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account must be bound to a user certificate when PKI-based authentication is implemented.\n\nThis requirement applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management).",
"fixid": "F-16953r291103_fix",
"fixtext": "If PKI-based, user authentication intermediary services are provided, configure the BIG-IP Core as follows: \n\nConfigure a policy in the BIG-IP APM module to map the authenticated identity to the user account for PKI-based authentication.\n\nApply APM policy to the applicable Virtual Server(s) in BIG-IP LTM module to map the authenticated identity to the user account for PKI-based authentication to virtual servers.",
"iacontrols": null,
"id": "V-215763",
"ruleID": "SV-215763r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation providing PKI-based, user authentication intermediary services must be configured to map the authenticated identity to the user account for PKI-based authentication to virtual servers.",
"version": "F5BI-LT-000085"
},
"V-215764": {
"checkid": "C-16956r291105_chk",
"checktext": "If the BIG-IP Core does not provide user authentication intermediary services for virtual servers, this is not applicable.\n\nWhen user authentication intermediary services are provided, review the BIG-IP LTM module authentication functions to verify identification and authentication are required for non-organizational users.\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users) when connecting to virtual servers.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nIf the BIG-IP Core does not uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users) when connecting to virtual servers, this is a finding.",
"description": "Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity for intruders to compromise resources within the network infrastructure. By identifying and authenticating non-organizational users, their access to network resources can be restricted accordingly.\n\nNon-organizational users will be uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization when related to the use of anonymous access. Authorization requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of user identities is accomplished through the use of passwords, tokens, biometrics, or in the case of multifactor authentication, some combination thereof.\n\nThis control applies to application layer gateways that provide content filtering and proxy services on network segments (e.g., DMZ) that allow access by non-organizational users. This requirement focuses on authentication requests to the proxied application for access to destination resources and policy filtering decisions rather than administrator and management functions.",
"fixid": "F-16954r291106_fix",
"fixtext": "If user authentication intermediary services are provided, configure BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP APM module to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).\n\nApply APM policy to the applicable Virtual Server(s) in BIG-IP LTM module to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users) when connecting to virtual servers.",
"iacontrols": null,
"id": "V-215764",
"ruleID": "SV-215764r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users) when connecting to virtual servers.",
"version": "F5BI-LT-000087"
},
"V-215765": {
"checkid": "C-16957r291108_chk",
"checktext": "Verify the BIG-IP Core is configured to terminate all network connections associated with a communications session at the end of the session as follows:\n\nVerify a Protocol Profile is configured to terminate a session at the end of a specified time.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Profiles >> Protocol >> TCP.\n\nSelect a profile for an in-band managed session.\n\nVerify the TCP profile 'idle-timeout' is set to 600/900 seconds\n\nSelect a profile for a user session.\n\nVerify the TCP profile 'idle-timeout' is set to 600/900 seconds\n\nVerify the BIG-IP LTM is configured to use the Protocol Profile.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect appropriate virtual server.\n\nVerify the TCP profile 'idle-timeout' is set to 600/900 seconds\n\nIf the BIG-IP Core is not configured to terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged sessions), the session must be terminated after 15 minutes of inactivity, this is a finding.",
"description": "Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unattended. In addition, quickly terminating an idle session will also free up resources committed by the managed network element.\n\nTerminating network connections associated with communications sessions includes, for example, de-allocating associated TCP/IP address/port pairs at the operating system level and de-allocating networking assignments at the application level if multiple application sessions are using a single operating system level network connection.\n\nALGs may provide session control functionality as part of content filtering, load balancing, or proxy services.",
"fixid": "F-16955r291109_fix",
"fixtext": "Configure BIG-IP Core to terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged sessions), the session must be terminated after 15 minutes of inactivity. ",
"iacontrols": null,
"id": "V-215765",
"ruleID": "SV-215765r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity.",
"version": "F5BI-LT-000093"
},
"V-215766": {
"checkid": "C-16958r291111_chk",
"checktext": "Verify the BIG-IP Core is configured to protect the authenticity of communications sessions. \n\nNavigate to the BIG-IP System manager >> Local Traffic >> Profiles >> SSL >> Client\n\nVerify a profile exists that is FIPS compliant.\n\nSelect FIPS-compliant profile.\n\nSelect \"Advanced\" next to \"Configuration\".\n\nVerify \"Ciphers\" under \"Configuration\" section is configured to use FIPS-compliant ciphers.\n\nVerify the BIG-IP Core is configured to use FIPS-compliant profile:\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Server(s) from the list that the LTM module is managing the Client SSL side traffic.\n\nVerify under \"Configuration\" section, that FIPS-compliant profile is in the \"Selected\" area for \"SSL Profile (Client)\".\n\nIf the BIG-IP Core is not configured to protect the authenticity of communications sessions, this is a finding.",
"description": "Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false information into sessions.\n\nThis requirement focuses on communications protection for the application session rather than for the network packet and establishes grounds for confidence at both ends of communications sessions in ongoing identities of other parties and in the validity of information transmitted. Depending on the required degree of confidentiality and integrity, web services/SOA will require the use of TLS/TLS mutual authentication (two-way/bidirectional).",
"fixid": "F-16956r291112_fix",
"fixtext": "Configure BIG-IP Core to protect the authenticity of communications sessions.",
"iacontrols": null,
"id": "V-215766",
"ruleID": "SV-215766r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to protect the authenticity of communications sessions.",
"version": "F5BI-LT-000097"
},
"V-215772": {
"checkid": "C-16964r291129_chk",
"checktext": "If the BIG-IP Core does not serve as an intermediary for remote access traffic (e.g., web content filter, TLS, and webmail) for virtual servers, this is not applicable.\n\nWhen intermediary services for remote access communications are provided, verify the BIG-IP Core is configured to control remote access methods.\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to control remote access methods.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section that \"Access Policy\" has been set to use an APM access policy that controls remote access methods to virtual servers.\n\nIf the BIG-IP Core does not control remote access methods, this is a finding.",
"description": "Remote access devices, such as those providing remote access to network devices and information systems, which lack automated control capabilities, increase risk and make remote user access management difficult at best.\n\nRemote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include broadband and wireless connections. Remote access methods include, for example, proxied remote encrypted traffic (e.g., TLS gateways, web content filters, and webmail proxies).\n\nThis requirement applies to ALGs providing remote access proxy services as part of its intermediary services (e.g., OWA or TLS gateway). ALGs that proxy remote access must be capable of taking enforcement action (i.e., blocking, restricting, or forwarding to an enforcement mechanism) if traffic monitoring reveals unauthorized activity.",
"fixid": "F-16962r291130_fix",
"fixtext": "If intermediary services for remote access communications traffic are provided, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP APM module to control remote access methods.\n\nApply APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to control remote access methods to virtual servers.",
"iacontrols": null,
"id": "V-215772",
"ruleID": "SV-215772r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation providing intermediary services for remote access communications traffic must control remote access methods to virtual servers.",
"version": "F5BI-LT-000153"
},
"V-215773": {
"checkid": "C-16965r291132_chk",
"checktext": "If the BIG-IP Core does not perform content filtering as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content filtering is performed as part of the traffic management functionality, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an ASM policy to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Application Security Policy\" is Enabled and \"Policy\" is set to use an ASM policy to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers.\n\nIf the BIG-IP Core is not configured to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.",
"description": "Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unauthorized data mining may result in the compromise of information.\n\nInjection attacks allow an attacker to inject code into a program or query or inject malware into a computer to execute remote commands that can read or modify a database or change data on a website. Web applications frequently access databases to store, retrieve, and update information. An attacker can construct inputs that the database will execute. This is most commonly referred to as a code injection attack. This type of attack includes XPath and LDAP injections.\n\nCompliance requires the ALG to have the capability to prevent code injections. Examples include Web Application Firewalls (WAFs) or database application gateways.",
"fixid": "F-16963r291133_fix",
"fixtext": "If the BIG-IP Core performs content filtering as part of the traffic management functionality, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP ASM module to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.\n\nApply ASM policy to the applicable Virtual Server(s) in BIG-IP LTM module to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers.",
"iacontrols": null,
"id": "V-215773",
"ruleID": "SV-215773r557356_rule",
"severity": "medium",
"title": "To protect against data mining, the BIG-IP Core implementation must be configured to prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers.",
"version": "F5BI-LT-000157"
},
"V-215774": {
"checkid": "C-16966r291135_chk",
"checktext": "If the BIG-IP Core does not perform content filtering as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content filtering is performed as part of the traffic management functionality, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an ASM policy to prevent code injection attacks from being launched against application objects, including, at a minimum, application URLs, and application code and application.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Application Security Policy\" is Enabled and \"Policy\" is set to use an ASM policy to prevent code injection attacks from being launched against application objects, including, at a minimum, application URLs and application code.\n\nIf the BIG-IP Core is not configured to prevent code injection attacks from being launched against application objects, including, at a minimum, application URLs and application code, this is a finding.",
"description": "Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unauthorized data mining may result in the compromise of information.\n\nInjection attacks allow an attacker to inject code into a program or query or inject malware into a computer to execute remote commands that can read or modify a database or change data on a website. These attacks include buffer overrun, XML, JavaScript, and HTML injections.\n\nCompliance requires the ALG to have the capability to prevent code injections. Examples include Web Application Firewalls (WAFs) or database application gateways.",
"fixid": "F-16964r291136_fix",
"fixtext": "If the BIG-IP Core performs content filtering as part of the traffic management functionality, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP ASM module to prevent code injection attacks from being launched against application objects, including, at a minimum, application URLs and application code.\n\nApply ASM policy to the applicable Virtual Server(s) in BIG-IP LTM module to prevent code injection attacks from being launched against application objects, including, at a minimum, application URLs and application code.",
"iacontrols": null,
"id": "V-215774",
"ruleID": "SV-215774r557356_rule",
"severity": "medium",
"title": "To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to prevent code injection attacks from being launched against application objects, including, at a minimum, application URLs and application code.",
"version": "F5BI-LT-000159"
},
"V-215775": {
"checkid": "C-16967r291138_chk",
"checktext": "If the BIG-IP Core does not perform content filtering as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content filtering is performed as part of the traffic management functionality, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an ASM policy to prevent SQL injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, and database fields.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Application Security Policy\" is Enabled and \"Policy\" is set to use an ASM policy to prevent SQL injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, and database fields.\n\nIf the BIG-IP Core is not configured to prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.",
"description": "Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unauthorized data mining may result in the compromise of information.\n\nSQL injection attacks are the most prevalent attacks against web applications and databases. These attacks inject SQL commands that can read, modify, or compromise the meaning of the original SQL query. An attacker can spoof identity; expose, tamper, destroy, or make existing data unavailable; or gain unauthorized privileges on the database server.\n\nCompliance requires the ALG to have the capability to prevent SQL code injections. Examples include Web Application Firewalls (WAFs) or database application gateways.",
"fixid": "F-16965r291139_fix",
"fixtext": "If the BIG-IP Core performs content filtering as part of the traffic management functionality, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP ASM module to prevent SQL injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, and database fields.\n\nApply a policy to the applicable Virtual Server(s) in BIG-IP LTM module that was configured in the ASM module to prevent SQL injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, and database fields.",
"iacontrols": null,
"id": "V-215775",
"ruleID": "SV-215775r557356_rule",
"severity": "medium",
"title": "To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to prevent SQL injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, and database fields.",
"version": "F5BI-LT-000161"
},
"V-215776": {
"checkid": "C-16968r291141_chk",
"checktext": "If the BIG-IP Core does not perform content filtering as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content filtering is performed as part of the traffic management functionality, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an ASM policy to detect code injection attacks being launched against data storage objects.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Application Security Policy\" is Enabled and \"Policy\" is set to detect code injection attacks being launched against data storage objects.\n\nIf the BIG-IP Core is not configured to detect code injection attacks being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.",
"description": "Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational databases may result in the compromise of information.\n\nInjection attacks allow an attacker to inject code into a program or query or inject malware into a computer to execute remote commands that can read or modify a database or change data on a website. Web applications frequently access databases to store, retrieve, and update information. An attacker can construct inputs that the database will execute. This is most commonly referred to as a code injection attack. This type of attack includes XPath and LDAP injections.\n\nALGs with anomaly detection must be configured to protect against unauthorized code injections. These devices must include rules and anomaly detection algorithms to monitor for atypical database queries or accesses. Examples include Web Application Firewalls (WAFs) or database application gateways.",
"fixid": "F-16966r291142_fix",
"fixtext": "If the BIG-IP Core performs content filtering as part of the traffic management functionality, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP ASM module to detect code injection attacks being launched against data storage objects.\n\nApply a policy to the applicable Virtual Server(s) in BIG-IP LTM module that was configured in the ASM module to detect code injection attacks being launched against data storage objects.",
"iacontrols": null,
"id": "V-215776",
"ruleID": "SV-215776r557356_rule",
"severity": "medium",
"title": "To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect code injection attacks being launched against data storage objects.",
"version": "F5BI-LT-000163"
},
"V-215777": {
"checkid": "C-16969r291144_chk",
"checktext": "If the BIG-IP Core does not perform content filtering as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content filtering is performed as part of the traffic management functionality, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an ASM policy to detect SQL injection attacks being launched against data storage objects, including, at a minimum, databases, database records, and database fields.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Application Security Policy\" is Enabled and \"Policy\" is set to detect SQL injection attacks being launched against data storage objects, including, at a minimum, databases, database records, and database fields.\n\nIf the BIG-IP Core is not configured to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.",
"description": "Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational databases may result in the compromise of information.\n\nSQL injection attacks are the most prevalent attacks against web applications and databases. These attacks inject SQL commands that can read, modify, or compromise the meaning of the original SQL query. An attacker can spoof identity; expose, tamper, destroy, or make existing data unavailable; or gain unauthorized privileges on the database server.\n\nALGs with anomaly detection must be configured to protect against unauthorized data mining attacks. These devices must include rules and anomaly detection algorithms to monitor for atypical database queries or accesses. Examples include Web Application Firewalls (WAFs) or database application gateways.",
"fixid": "F-16967r291145_fix",
"fixtext": "If the BIG-IP Core performs content filtering as part of the traffic management functionality, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP ASM module to detect SQL injection attacks being launched against data storage objects, including, at a minimum, databases, database records, and database fields.\n\nApply ASM policy to the applicable Virtual Server(s) in BIG-IP LTM module to detect SQL injection attacks being launched against data storage objects, including, at a minimum, databases, database records, and database fields.",
"iacontrols": null,
"id": "V-215777",
"ruleID": "SV-215777r557356_rule",
"severity": "medium",
"title": "To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect SQL injection attacks being launched against data storage objects, including, at a minimum, databases, database records, and database fields.",
"version": "F5BI-LT-000165"
},
"V-215778": {
"checkid": "C-16970r291147_chk",
"checktext": "If the BIG-IP Core does not perform content filtering as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content filtering is performed as part of the traffic management functionality, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an ASM policy to detect code injection attacks being launched against application objects, including, at a minimum, application URLs and application code.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Application Security Policy\" is Enabled and \"Policy\" is set to detect code injection attacks being launched against application objects, including, at a minimum, application URLs and application code, when providing content filtering to virtual servers.\n\nIf the BIG-IP Core is not configured to detect code injection attacks from being launched against application objects, including, at a minimum, application URLs and application code, this is a finding.",
"description": "Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational applications may result in the compromise of information.\n\nInjection attacks allow an attacker to inject code into a program or query or inject malware into a computer to execute remote commands that can read or modify a database or change data on a website. These attacks include buffer overrun, XML, JavaScript, and HTML injections.\n\nALGs with anomaly detection must be configured to protect against unauthorized code injections. These devices must include rules and anomaly detection algorithms to monitor for atypical database queries or accesses. Examples include Web Application Firewalls (WAFs) or database application gateways.",
"fixid": "F-16968r291148_fix",
"fixtext": "If the BIG-IP Core performs content filtering as part of the traffic management functionality, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP ASM module to detect code injection attacks being launched against application objects, including, at a minimum, application URLs and application code.\n\nApply ASM policy to the applicable Virtual Server(s) in BIG-IP LTM module to detect code injection attacks being launched against application objects, including, at a minimum, application URLs and application code, when providing content filtering to virtual servers.",
"iacontrols": null,
"id": "V-215778",
"ruleID": "SV-215778r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to detect code injection attacks being launched against application objects, including, at a minimum, application URLs and application code, when providing content filtering to virtual servers.",
"version": "F5BI-LT-000167"
},
"V-215779": {
"checkid": "C-16971r291150_chk",
"checktext": "If the BIG-IP Core does not provide user authentication intermediary services for virtual servers, this is not applicable.\n\nWhen user authentication intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to require users to re-authenticate when required by organization-defined circumstances or situations.\n\nNavigate to the BIG-IP System manager>>Local Traffic>>Virtual Servers>>Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section that \"Access Policy\" has been set to use an APM access policy that requires users to re-authenticate to virtual servers when organization-defined circumstances or situations require re-authentication.\n\nIf the BIG-IP Core is not configured to require users to re-authenticate when organization-defined circumstances or situations require re-authentication, this is a finding.",
"description": "Without re-authentication, users may access resources or perform tasks for which they do not have authorization.\n\nIn addition to the re-authentication requirements associated with session locks, organizations may require re-authentication of individuals and/or devices in other situations, including (but not limited to) the following circumstances: \n\n1) When authenticators change;\n2) When roles change;\n3) When security categories of information systems change;\n4) When the execution of privileged functions occurs;\n5) After a fixed period of time; and\n6) Periodically.\n\nWithin the DoD, the minimum circumstances requiring re-authentication are privilege escalation and role changes.\n\nThis requirement only applies to components where this is specific to the function of the device or has the concept of user authentication (e.g., VPN or ALG capability). This does not apply to authentication for the purpose of configuring the device itself (i.e., device management).",
"fixid": "F-16969r291151_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP APM module to require multifactor authentication for remote access to require users to re-authenticate when required by organization-defined circumstances or situations.\n\nApply APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to require users to re-authenticate to virtual servers when organization-defined circumstances or situations require re-authentication.",
"iacontrols": null,
"id": "V-215779",
"ruleID": "SV-215779r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to require users to re-authenticate to virtual servers when organization-defined circumstances or situations require re-authentication.",
"version": "F5BI-LT-000191"
},
"V-215780": {
"checkid": "C-16972r291153_chk",
"checktext": "If the BIG-IP Core does not provide user authentication intermediary services for virtual servers, this is not applicable.\n\nWhen user authentication intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to require multifactor authentication for remote access to non-privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section that \"Access Policy\" has been set to use an APM access policy to require multifactor authentication for remote access to non-privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.\n\nIf the BIG-IP Core does not implement multifactor authentication for remote access to non-privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access, this is a finding.",
"description": "For remote access to non-privileged accounts, the purpose of requiring a device that is separate from the information system gaining access for one of the factors during multifactor authentication is to reduce the likelihood of compromising authentication credentials stored on the system.\n\nMultifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD common access card.\n\nA privileged account is defined as an information system account with authorizations of a privileged user.\n\nRemote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless.\n\nAn example of compliance with this requirement is the use of a one-time password token and PIN coupled with a password; or the use of a CAC/PIV card and PIN coupled with a password.",
"fixid": "F-16970r291154_fix",
"fixtext": "If user authentication intermediary services are provided, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP APM module to require multifactor authentication for remote access to non-privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.\n\nApply APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to require multifactor authentication for remote access to non-privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.",
"iacontrols": null,
"id": "V-215780",
"ruleID": "SV-215780r557356_rule",
"severity": "medium",
"title": "A BIG-IP Core implementation providing user authentication intermediary services must be configured to require multifactor authentication for remote access to non-privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.",
"version": "F5BI-LT-000193"
},
"V-215781": {
"checkid": "C-16973r291156_chk",
"checktext": "If the BIG-IP Core does not provide user authentication intermediary services for virtual servers, this is not applicable.\n\nWhen user authentication intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to require multifactor authentication for remote access with privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section, that \"Access Policy\" has been set to use an APM access policy to require multifactor authentication for remote access with privileged accounts to virtual servers in such a way that one of the factors is provided by a device separate from the system gaining access.\n\nIf the BIG-IP Core does not implement multifactor authentication for remote access to privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access, this is a finding.",
"description": "For remote access to privileged accounts, the purpose of requiring a device that is separate from the information system gaining access for one of the factors during multifactor authentication is to reduce the likelihood of compromising authentication credentials stored on the system.\n\nMultifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD common access card.\n\nA privileged account is defined as an information system account with authorizations of a privileged user.\n\nRemote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless.",
"fixid": "F-16971r291157_fix",
"fixtext": "If user authentication intermediary services are provided, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP APM module to require multifactor authentication for remote access with privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.\n\nApply APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to require multifactor authentication for remote access with privileged accounts to virtual servers in such a way that one of the factors is provided by a device separate from the system gaining access.",
"iacontrols": null,
"id": "V-215781",
"ruleID": "SV-215781r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation providing user authentication intermediary services must be configured to require multifactor authentication for remote access with privileged accounts to virtual servers in such a way that one of the factors is provided by a device separate from the system gaining access.",
"version": "F5BI-LT-000195"
},
"V-215784": {
"checkid": "C-16976r291165_chk",
"checktext": "If the BIG-IP Core does not provide user authentication intermediary services for virtual servers, this is not applicable.\n\nWhen user authentication intermediary services are provided, verify the BIG-IP Core is configured to deny-by-default user access when revocation information is not accessible via the network.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Profiles >> SSL >> Client.\n\nSelect an SSL client profile that is used for client authentication with Virtual Server(s).\n\nReview the configuration under the \"Client Authentication\" section.\n\nVerify that \"Client Certificate\" is set to \"require\" if not using the APM.\n\nVerify that \u201cOn Demand Cert Auth\u201d in the access profile is set to \u201cRequire\u201d if using APM.\n\nIf the BIG-IP Core is not configured to deny-by-default when unable to access revocation information via the network, this is a finding.\n",
"description": "When revocation data is unavailable from the network, the system should be configured to deny-by-default to mitigate the risk of a user with a revoked certificate gaining unauthorized access. Local cached revocation data can be out of date or not able to be installed on the local system, which increases administration burden for the system.\n\n\nThe intent of this requirement is to deny unauthenticated users access to virtual servers in case access to OCSP (required by CCI-000185) is not available.\n\nThis requirement applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management).",
"fixid": "F-16974r291166_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core to deny-by-default when access to revocation information via the network is inaccessible.",
"iacontrols": null,
"id": "V-215784",
"ruleID": "SV-215784r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to deny-by-default all PKI-based authentication to virtual servers supporting path discovery and validation if unable to access revocation information via the network.",
"version": "F5BI-LT-000203"
},
"V-215788": {
"checkid": "C-16980r291177_chk",
"checktext": "If the BIG-IP Core does not provide user authentication intermediary services for virtual servers, this is not applicable.\n\nWhen user authentication intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to conform to FICAM-issued profiles when providing authentication.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section that \"Access Policy\" has been set to conform to FICAM-issued profiles when providing authentication to pools/nodes.\n\nIf the BIG-IP Core is not configured to conform to FICAM-issued profiles, this is a finding.",
"description": "Without conforming to Federal Identity, Credential, and Access Management (FICAM)-issued profiles, the information system may not be interoperable with FICAM-authentication protocols, such as SAML 2.0 and OpenID 2.0.\n\nUse of FICAM-issued profiles addresses open identity management standards.\n\nThis requirement only applies to components where this is specific to the function of the device or has the concept of a non-organizational user, (e.g., ALG capability that is the front end for an application in a DMZ).",
"fixid": "F-16978r291178_fix",
"fixtext": "If user authentication intermediary services are provided, configure BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP APM module to conform to FICAM-issued profiles when providing authentication.\n\nApply APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to conform to FICAM-issued profiles when providing authentication to virtual servers.",
"iacontrols": null,
"id": "V-215788",
"ruleID": "SV-215788r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be able to conform to FICAM-issued profiles when providing authentication to virtual servers.",
"version": "F5BI-LT-000211"
},
"V-215789": {
"checkid": "C-16981r291180_chk",
"checktext": "Verify the BIG-IP Core is configured to allow the use of DoD-approved PKI-established certificate authorities for verification of the establishment of protected sessions. \n\nNavigate to the BIG-IP System manager >> System >> File Management >> SSL Certificate List.\n\nValidate that an approved DOD CA Bundle is listed.\n\nIf the BIG-IP Core is not configured to use DoD-approved PKI-established certificate authorities for verification of the establishment of protected sessions, this is a finding.",
"description": "Untrusted certificate authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient security controls. If the CA used for verifying the certificate is not a DoD-approved CA, trust of this CA has not been established.\n\nThe DoD will only accept PKI certificates obtained from a DoD-approved internal or external certificate authority. Reliance on CAs for the establishment of secure sessions includes, for example, the use of TLS/TLS certificates.\n\nThis requirement focuses on communications protection for the application session rather than for the network packet.",
"fixid": "F-16979r291181_fix",
"fixtext": "Configure the BIG-IP Core to only allow the use of DoD-approved PKI-established certificate authorities for verification of the establishment of protected sessions.",
"iacontrols": null,
"id": "V-215789",
"ruleID": "SV-215789r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to only allow the use of DoD-approved PKI-established certificate authorities for verification of the establishment of protected sessions.",
"version": "F5BI-LT-000213"
},
"V-215790": {
"checkid": "C-16982r291183_chk",
"checktext": "If the BIG-IP Core does not perform content filtering as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content filtering is performed as part of the traffic management functionality, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with a security policy to protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"DoS Protection Profile\" is Enabled and \"Profile\" is set to use locally configured DoS protection Profile.\n\nVerify the DoS protection profile that is set for the Virtual Server is set to employ rate-based attack prevention:\n\nNavigate to the BIG-IP System manager >> Security >> DoS Protection >> DoS Profiles.\n\nSelect the DoS Protection Profile set for the Virtual Server.\n\nVerify that \"Application Security\" is Enabled under \"General Configuration\".\n\nVerify that the following are selected for \"Prevention Policy\" under TPS-base Anomaly in accordance with the organization requirements:\n\n\"Source IP-Based Client Side Integrity Defense\"\n\"URL-Based Client Side Integrity Defense\"\n\"Site-wide\" Client-Side Integrity Defense\"\n\"Source IP-Base Rate Limiting\"\n\"URL-Based Rate Limiting\"\n\"Site-wide Rate Limiting\"\n\nVerify the Criteria for each of the selected Prevention Policies is set in accordance with organization requirements.\n\nIf the BIG-IP Core is not configured to protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis, this is a finding.",
"description": "If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users.\n\nInstallation of content filtering gateways and application layer firewalls at key boundaries in the architecture mitigates the risk of DoS attacks. These attacks can be detected by matching observed communications traffic with patterns of known attacks and monitoring for anomalies in traffic volume/type.\n\nDetection components that use rate-based behavior analysis can detect attacks when signatures for the attack do not exist or are not installed. These attacks include zero-day attacks, which are new attacks for which vendors have not yet developed signatures. Rate-based behavior analysis can detect sophisticated, Distributed DoS (DDoS) attacks by correlating traffic information from multiple network segments or components.\n\nThis requirement applies to the functionality of the ALG as it pertains to handling communications traffic rather than to the ALG device itself.",
"fixid": "F-16980r291184_fix",
"fixtext": "If the BIG-IP Core performs content filtering as part of the traffic management functionality, configure the BIG-IP Core to protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis.",
"iacontrols": null,
"id": "V-215790",
"ruleID": "SV-215790r557356_rule",
"severity": "high",
"title": "The BIG-IP Core implementation must be configured to protect against known and unknown types of Denial of Service (DoS) attacks by employing rate-based attack prevention behavior analysis when providing content filtering to virtual servers.",
"version": "F5BI-LT-000215"
},
"V-215791": {
"checkid": "C-16983r291186_chk",
"checktext": "Verify the BIG-IP Core implements load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.\n\nNavigate to the BIG-IP System manager >> System >> Configuration >> Local Traffic >> General.\n\nVerify \"Reaper High-water Mark\" is set to 95 and \"Reaper Low-water Mark\" is set to 85.\n\nIf the device does not implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks, this is a finding.",
"description": "If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Load balancing provides service redundancy; which service redundancy reduces the susceptibility of the ALG to many DoS attacks.\n\nThe ALG must be configured to prevent or mitigate the impact on network availability and traffic flow of DoS attacks that have occurred or are ongoing.\n\nThis requirement applies to the functionality of the device as it pertains to handling network traffic. Some types of attacks may be specialized to certain network technologies, functions, or services. For each technology, known and potential DoS attacks must be identified and solutions for each type implemented.",
"fixid": "F-16981r291187_fix",
"fixtext": "Configure the BIG-IP Core to implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.\n\nNavigate to the BIG-IP System manager >> System >> Configuration >> Local Traffic >> General.\n\nMake the following configurations under \"Properties\".\n\nSet \"Reaper High-water Mark\" to 95.\n\nSet \"Reaper Low-water Mark\" to 85.",
"iacontrols": null,
"id": "V-215791",
"ruleID": "SV-215791r557356_rule",
"severity": "high",
"title": "The BIG-IP Core implementation must be configured to implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks to virtual servers.",
"version": "F5BI-LT-000217"
},
"V-215792": {
"checkid": "C-16984r291189_chk",
"checktext": "If the BIG-IP Core does not perform content filtering as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content filtering is performed as part of the traffic management functionality, verify the BIG-IP Core is configured to protect against known types of DoS attacks by employing signatures.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"DoS Protection Profile\" is Enabled and \"Profile\" is set to use locally configured DoS protection Profile.\n\nIf the BIG-IP Core does not protect against known types of DoS attacks by employing signatures, this is a finding.",
"description": " If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. \n\nInstallation of content filtering gateways and application layer firewalls at key boundaries in the architecture mitigates the risk of DoS attacks. These attacks can be detected by matching observed communications traffic with patterns of known attacks and monitoring for anomalies in traffic volume, type, or protocol usage.\n\nDetection components that use signatures can detect known attacks by using known attack signatures. Signatures are usually obtained from and updated by the ALG component vendor.\n\nThis requirement applies to the communications traffic functionality of the ALG as it pertains to handling communications traffic rather than to the ALG device itself.",
"fixid": "F-16982r291190_fix",
"fixtext": "If the BIG-IP Core performs content filtering as part of the traffic management functionality, configure the BIG-IP Core to protect against or limit the effects of known types of DoS attacks by employing signatures.",
"iacontrols": null,
"id": "V-215792",
"ruleID": "SV-215792r557356_rule",
"severity": "high",
"title": "The BIG-IP Core implementation must be configured to protect against known types of Denial of Service (DoS) attacks by employing signatures when providing content filtering to virtual servers.",
"version": "F5BI-LT-000219"
},
"V-215793": {
"checkid": "C-16985r291192_chk",
"checktext": "If the BIG-IP Core does not perform content filtering as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content filtering is performed as part of the traffic management functionality, verify the BIG-IP Core protects against or limits the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors.\n\nVerify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an ASM policy to protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing pattern recognition pre-processors when providing content filtering to virtual servers.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"DoS Protection Profile\" is Enabled and \"Profile\" is set to use a locally configured DoS protection Profile.\n\nVerify the DoS protection profile that is set for the Virtual Server is set to employ pattern recognition pre-processors:\n\nNavigate to the BIG-IP System manager >> Security >> DoS Protection >> DoS Profiles.\n\nSelect the DoS Protection Profile set for the Virtual Server.\n\nVerify that \"Application Security\" is Enabled under \"General Configuration\".\n\nVerify that the following are selected for \"Prevention Policy\" under TPS-base Anomaly in accordance with the organization requirements:\n\n\"Source IP-Based Client Side Integrity Defense\"\n\"URL-Based Client Side Integrity Defense\"\n\"Site-wide\" Client-Side Integrity Defense\"\n\nVerify the Criteria for each of the selected Prevention Policies is set in accordance with organization requirements.\n\nIf the BIG-IP Core is not configured to protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors, this is a finding.",
"description": "If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users.\n\nInstallation of content filtering gateways and application layer firewalls at key boundaries in the architecture mitigates the risk of DoS attacks. These attacks can be detected by matching observed communications traffic with patterns of known attacks.\n\nDetection components that use pattern recognition pre-processors can detect attacks when signatures for the attack do not exist or are not installed. These attacks include zero-day attacks, which are new attacks for which vendors have not yet developed signatures.\n\nThis requirement applies to the communications traffic functionality of the ALG as it pertains to handling communications traffic, rather than to the ALG device itself.",
"fixid": "F-16983r291193_fix",
"fixtext": "If the BIG-IP Core performs content filtering as part of the traffic management functionality, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP ASM module to protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors. \n\nApply ASM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors when providing content filtering to virtual servers.",
"iacontrols": null,
"id": "V-215793",
"ruleID": "SV-215793r557356_rule",
"severity": "high",
"title": "The BIG-IP Core implementation must be configured to protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing pattern recognition pre-processors when providing content filtering to virtual servers.",
"version": "F5BI-LT-000221"
},
"V-215794": {
"checkid": "C-16986r291195_chk",
"checktext": "If the BIG-IP Core does not perform packet-filtering intermediary services for virtual servers, this is not applicable.\n\nWhen packet-filtering intermediary services are performed, verify the BIG-IP Core is configured to only allow incoming communications from authorized sources routed to authorized destinations as follows:\n\nVerify Virtual Server(s) are configured in the BIG-IP LTM module with policies to only allow incoming communications from authorized sources routed to authorized destinations.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Network Firewall\" Enforcement is set to \"Policy Rules...\" and \"Policy\" is set to use an AFM policy to only allow incoming communications from authorized sources routed to authorized destinations.\n\nIf the BIG-IP Core is configured to allow incoming communications from unauthorized sources routed to unauthorized destinations, this is a finding.",
"description": "Unrestricted traffic may contain malicious traffic that poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth and other resources.\n\nAccess control policies and access control lists implemented on devices that control the flow of network traffic (e.g., application-level firewalls and Web content filters), ensure the flow of traffic is only allowed from authorized sources to authorized destinations. Networks with different levels of trust (e.g., the Internet or CDS) must be kept separate.",
"fixid": "F-16984r291196_fix",
"fixtext": "If user packet-filtering intermediary services are provided, configure the BIG-IP Core as follows: \n\nConfigure a policy in the BIG-IP AFM module to only allow incoming communications from authorized sources routed to authorized destinations.\n\nApply the AFM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to only allow incoming communications from authorized sources routed to authorized destinations.",
"iacontrols": null,
"id": "V-215794",
"ruleID": "SV-215794r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to only allow incoming communications from authorized sources routed to authorized destinations.",
"version": "F5BI-LT-000223"
},
"V-215795": {
"checkid": "C-16987r291198_chk",
"checktext": "Verify the BIG-IP Core is configured to handle invalid inputs in a predictable and documented manner that reflects organizational and system objectives.\n\nThis can be demonstrated by the SA sending an invalid input to a virtual server. Provide evidence that the virtual server was able to handle the invalid input and maintain operation.\n\nIf the BIG-IP Core is not configured to handle invalid inputs in a predictable and documented manner that reflects organizational and system objectives, this is a finding.",
"description": "A common vulnerability of network elements is unpredictable behavior when invalid inputs are received. This requirement guards against adverse or unintended system behavior caused by invalid inputs, where information system responses to the invalid input may be disruptive or cause the system to fail into an unsafe state.\n\nThe behavior will be derived from the organizational and system requirements and includes, but is not limited to, notification of the appropriate personnel, creating an audit record, and rejecting invalid input.\n\nThis requirement applies to gateways and firewalls that perform content inspection or have higher-layer proxy functions.",
"fixid": "F-16985r291199_fix",
"fixtext": "Configure the BIG-IP Core to handle invalid inputs in a predictable and documented manner that reflects organizational and system objectives.",
"iacontrols": null,
"id": "V-215795",
"ruleID": "SV-215795r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to handle invalid inputs in a predictable and documented manner that reflects organizational and system objectives.",
"version": "F5BI-LT-000229"
},
"V-215796": {
"checkid": "C-16988r291201_chk",
"checktext": "If the BIG-IP Core does not perform content filtering as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content filtering is performed as part of the traffic management functionality, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an ASM policy to continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Application Security Policy\" is Enabled and \"Policy\" is set to use an ASM policy to continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.\n\nIf the BIG-IP Core is not configured to continuously monitor inbound communications traffic for unusual or unauthorized activities or conditions, this is a finding.",
"description": "If inbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output from application and traffic monitoring serves as input to continuous monitoring and incident response programs.\n\nInternal monitoring includes the observation of events occurring on the network crossing internal boundaries at managed interfaces such as web content filters. Depending on the type of ALG, organizations can monitor information systems by monitoring audit activities, application access patterns, characteristics of access, content filtering, or unauthorized exporting of information across boundaries. Unusual/unauthorized activities or conditions may include large file transfers, long-time persistent connections, unusual protocols and ports in use, and attempted communications with suspected malicious external addresses.",
"fixid": "F-16986r291202_fix",
"fixtext": "If the BIG-IP Core performs content filtering as part of the traffic management functionality, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP ASM module to continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.\n\nApply ASM policy to the applicable Virtual Server(s) in BIG-IP LTM module to continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.",
"iacontrols": null,
"id": "V-215796",
"ruleID": "SV-215796r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must continuously monitor inbound communications traffic crossing internal security boundaries for unusual or unauthorized activities or conditions.",
"version": "F5BI-LT-000239"
},
"V-215797": {
"checkid": "C-16989r291204_chk",
"checktext": "If the BIG-IP Core does not perform content inspection as part of the traffic management functionality for virtual servers, this is not applicable.\n\nWhen content inspection is performed as part of the traffic management functionality, verify the BIG-IP Core is configured to check the validity of all data inputs except those specifically identified by the organization.\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an ASM policy to check the validity of all data inputs except those specifically identified by the organization.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nNavigate to the Security >> Policies tab.\n\nVerify that \"Application Security Policy\" is Enabled and \"Policy\" is set to use an ASM policy to check the validity of all data inputs except those specifically identified by the organization.\n\nIf the BIG-IP Core is not configured to check the validity of all data inputs except those specifically identified by the organization, this is a finding.",
"description": "Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application is unprepared to process that data. This results in unanticipated application behavior potentially leading to an application or information system compromise. Invalid input is one of the primary methods employed when attempting to compromise an application.\n\nNetwork devices with the functionality to perform application layer inspection may be leveraged to validate data content of network communications. Checking the valid syntax and semantics of information system inputs (e.g., character set, length, numerical range, and acceptable values) verifies that inputs match specified definitions for format and content. Software typically follows well-defined protocols that use structured messages (i.e., commands or queries) to communicate between software modules or system components. Structured messages can contain raw or unstructured data interspersed with metadata or control information. If network elements use attacker-supplied inputs to construct structured messages without properly encoding such messages, then the attacker could insert malicious commands or special characters that can cause the data to be interpreted as control information or metadata. Consequently, the module or component that receives the tainted output will perform the wrong operations or otherwise interpret the data incorrectly. Pre-screening inputs prior to passing to interpreters prevents the content from being unintentionally interpreted as commands. Input validation helps to ensure accurate and correct inputs and prevent attacks such as cross-site scripting and a variety of injection attacks.\n\nThis requirement applies to gateways and firewalls that perform content inspection or have higher-layer proxy functionality.\n\nNote: A limitation of ~200 policies per cluster currently exists on the BIG-IP Core. If this requirement cannot be met due to this limitation, documentation from the AO is required.",
"fixid": "F-16987r291205_fix",
"fixtext": "If the BIG-IP Core performs content inspection as part of the traffic management functionality, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP ASM module to check the validity of all data inputs except those specifically identified by the organization.\n\nApply ASM policy to the applicable Virtual Server(s) in BIG-IP LTM module to check the validity of all data inputs except those specifically identified by the organization.",
"iacontrols": null,
"id": "V-215797",
"ruleID": "SV-215797r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to check the validity of all data inputs except those specifically identified by the organization.",
"version": "F5BI-LT-000261"
},
"V-215798": {
"checkid": "C-16990r291207_chk",
"checktext": "If the BIG-IP Core does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC) for virtual servers, this is not applicable.\n\nWhen encryption intermediary services are provided, verify the BIG-IP Core is configured to implement NIST FIPS-validated cryptography to generate cryptographic hashes.\n\nNavigate to the BIG-IP System manager >> Local traffic >> Profiles >> SSL >> Client.\n\nVerify a profile exists that is FIPS Compliant.\n\nSelect a FIPS-compliant profile.\n\nSelect \"Advanced\" next to \"Configuration\".\n\nVerify \"Ciphers\" under \"Configuration\" section is configured to use FIPS-compliant ciphers.\n\nVerify applicable virtual servers are configured in the BIG-IP LTM to use a FIPS-compliant client profile:\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Configuration\" section, that a FIPS-compliant profile is in the \"Selected\" area of \"SSL Profile (Client)\".\n\nIf the BIG-IP Core is not configured to implement NIST FIPS-validated cryptography to generate cryptographic hashes, this is a finding.",
"description": "Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network element must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.\n\nThis requirement applies only to ALGs that provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC).",
"fixid": "F-16988r291208_fix",
"fixtext": "If encryption intermediary services are provided, configure the BIG-IP Core to implement NIST FIPS-validated cryptography to generate cryptographic hashes.",
"iacontrols": null,
"id": "V-215798",
"ruleID": "SV-215798r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to implement NIST FIPS-validated cryptography to generate cryptographic hashes when providing encryption traffic to virtual servers.",
"version": "F5BI-LT-000291"
},
"V-215799": {
"checkid": "C-16991r291210_chk",
"checktext": "If the BIG-IP Core does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC) for virtual servers, this is not applicable.\n\nWhen encryption intermediary services are provided, verify the BIG-IP Core is configured to implement NIST FIPS-validated cryptography for digital signatures.\n\nNavigate to the BIG-IP System manager >> Local traffic >> Profiles >> SSL >> Client.\n\nVerify a profile exists that is FIPS Compliant.\n\nSelect a FIPS-compliant profile.\n\nSelect \"Advanced\" next to \"Configuration\".\n\nVerify \"Ciphers\" under \"Configuration\" section is configured to use FIPS-compliant ciphers.\n\nVerify applicable virtual servers are configured in the BIG-IP LTM to use a FIPS-compliant client profile:\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Configuration\" section, that a FIPS-compliant profile is in the \"Selected\" area of \"SSL Profile (Client)\".\n\nIf the BIG-IP Core does not implement NIST FIPS-validated cryptography for digital signatures, this is a finding.",
"description": "Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network element must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.\n\nThis requirement applies only to ALGs that provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC).",
"fixid": "F-16989r291211_fix",
"fixtext": "If encryption intermediary services are provided, configure the BIG-IP Core to implement NIST FIPS-validated cryptography for digital signatures.",
"iacontrols": null,
"id": "V-215799",
"ruleID": "SV-215799r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to implement NIST FIPS-validated cryptography for digital signatures when providing encrypted traffic to virtual servers.",
"version": "F5BI-LT-000293"
},
"V-215800": {
"checkid": "C-16992r291213_chk",
"checktext": "If the BIG-IP Core does not provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC) for virtual servers, this is not applicable.\n\nWhen encryption intermediary services are provided, verify the BIG-IP Core is configured to use NIST FIPS-validated cryptography to implement encryption services.\n\nNavigate to the BIG-IP System manager >> Local traffic >> Profiles >> SSL >> Client.\n\nVerify a profile exists that is FIPS Compliant.\n\nSelect a FIPS-compliant profile.\n\nSelect \"Advanced\" next to \"Configuration\".\n\nVerify \"Ciphers\" under \"Configuration\" section is configured to use FIPS-compliant ciphers.\n\nVerify applicable virtual servers are configured in the BIG-IP LTM to use a FIPS-compliant client profile:\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Configuration\" section, that a FIPS-compliant profile is in the \"Selected\" area of \"SSL Profile (Client)\".\n\nIf the BIG-IP Core is not configured to use NIST FIPS-validated cryptography to implement encryption services, this is a finding.",
"description": "Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network element must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.\n\nThis requirement applies only to ALGs that provide encryption intermediary services (e.g., HTTPS, TLS, or DNSSEC).",
"fixid": "F-16990r291214_fix",
"fixtext": "If encryption intermediary services are provided, configure the BIG-IP Core to use NIST FIPS-validated cryptography to implement encryption services.",
"iacontrols": null,
"id": "V-215800",
"ruleID": "SV-215800r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to use NIST FIPS-validated cryptography to implement encryption services when providing encrypted traffic to virtual servers.",
"version": "F5BI-LT-000295"
},
"V-215801": {
"checkid": "C-16993r291216_chk",
"checktext": "If the BIG-IP Core does not provide intermediary/proxy services for SMTP communications traffic for virtual servers, this is not applicable.\n\nWhen intermediary/proxy services for SMTP communication traffic are provided, verify the BIG-IP Core is configured as follows:\n\nVerify the BIG-IP LTM module is configured to inspect for protocol compliance and protocol anomalies in inbound SMTP and Extended SMTP communications traffic.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect a Virtual Server that has been configured as an SMTP proxy.\n\nVerify that \"SMTP Profile\" under the \"Configuration\" section is set to a locally configured SMTP profile.\n\nVerify the configuration of the selected SMTP profile:\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Profiles >> Services >> SMTP.\n\nSelect the SMTP profile that was to configure the Virtual Server.\n\nVerify that \"Protocol Security\" is Enabled under the \"Settings\" section.\n\nIf the BIG-IP Core does not inspect inbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies, this is a finding.",
"description": "Application protocol anomaly detection examines application layer protocols such as SMTP to identify attacks based on observed deviations in the normal RFC behavior of a protocol or service. This type of monitoring allows for the detection of known and unknown exploits that exploit weaknesses of commonly used protocols.\n\nSince protocol anomaly analysis examines the application payload for patterns or anomalies, an SMTP proxy must be included in the ALG. This ALG will be configured to inspect inbound SMTP and Extended SMTP communications traffic to detect protocol anomalies such as malformed message and command insertion attacks.",
"fixid": "F-16991r291217_fix",
"fixtext": "If the BIG-IP Core provides intermediary/proxy services for SMTP communications traffic, configure the BIG-IP Core as follows:\n\nConfigure the BIG-IP LTM module to inspect for protocol compliance and protocol anomalies in inbound SMTP and Extended SMTP communications traffic.",
"iacontrols": null,
"id": "V-215801",
"ruleID": "SV-215801r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound SMTP and Extended SMTP communications traffic to virtual servers.",
"version": "F5BI-LT-000303"
},
"V-215802": {
"checkid": "C-16994r291219_chk",
"checktext": "If the BIG-IP Core does not provide intermediary/proxy services for FTP and FTPS communications traffic for virtual servers, this is not applicable.\n\nWhen intermediary/proxy services for FTP and FTPS communications traffic are provided, verify the BIG-IP Core is configured as follows:\n\nVerify the BIG-IP LTM module is configured to inspect for protocol compliance and protocol anomalies in inbound FTP and FTPS communications traffic.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect a Virtual Server that has been configured as an FTP proxy.\n\nVerify that \"FTP Profile\" under the \"Configuration\" section is set to a locally configured FTP profile.\n\nVerify the configuration of the selected FTP profile:\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Profiles >> Services >> FTP.\n\nSelect the FTP profile that was to configure the Virtual Server.\n\nVerify that \"Protocol Security\" is Enabled under the \"Settings\" section.\n\nIf the BIG-IP Core does not inspect inbound FTP and FTPS communications traffic for protocol compliance and protocol anomalies, this is a finding.",
"description": "Application protocol anomaly detection examines application layer protocols such as FTP to identify attacks based on observed deviations in the normal RFC behavior of a protocol or service. This type of monitoring allows for the detection of known and unknown exploits that exploit weaknesses of commonly used protocols.\n\nSince protocol anomaly analysis examines the application payload for patterns or anomalies, an FTP proxy must be included in the ALG. This ALG will be configured to inspect inbound FTP and FTPS communications traffic to detect protocol anomalies such as malformed message and command insertion attacks.",
"fixid": "F-16992r291220_fix",
"fixtext": "If the BIG-IP Core provides intermediary/proxy services for FTP and FTPS communications traffic, configure the BIG-IP Core as follows:\n\nConfigure the BIG-IP LTM module to inspect for protocol compliance and protocol anomalies in inbound FTP and FTPS communications traffic.",
"iacontrols": null,
"id": "V-215802",
"ruleID": "SV-215802r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound FTP and FTPS communications traffic to virtual servers.",
"version": "F5BI-LT-000305"
},
"V-215803": {
"checkid": "C-16995r291222_chk",
"checktext": "If the BIG-IP Core does not provide intermediary/proxy services for HTTP and HTTPS communications traffic for virtual servers, this is not applicable.\n\nWhen intermediary/proxy services for HTTP and HTTPS communications traffic are provided, verify the BIG-IP Core is configured as follows:\n\nVerify the BIG-IP LTM module is configured to inspect for protocol compliance and protocol anomalies in inbound HTTP and HTTPS communications traffic.\n\nNavigate to the BIG-IP System manager >> Security >> Protocol Security >> Security Profiles >> HTTP.\n\nVerify there is at least one profile for managing HTTP traffic.\n\nSelect a Profile from the list to verify.\n\nReview each of the following tabs to verify the proper criteria are selected and are set to \"Alarm\" at a minimum:\n\n\"HTTP Protocol Checks\"\n\"Request Checks\"\n\"Blocking Page\"\n\nIf the BIG-IP Core does not inspect inbound HTTP and HTTPS communications traffic for protocol compliance and protocol anomalies, this is a finding.",
"description": "Application protocol anomaly detection examines application layer protocols such as HTTP to identify attacks based on observed deviations in the normal RFC behavior of a protocol or service. This type of monitoring allows for the detection of known and unknown exploits that exploit weaknesses of commonly used protocols.\n\nSince protocol anomaly analysis examines the application payload for patterns or anomalies, an HTTP proxy must be included in the ALG. This ALG will be configured to inspect inbound HTTP and HTTPS communications traffic to detect protocol anomalies such as malformed message and command insertion attacks. Note that if mutual authentication is enabled, there will be no way to inspect HTTPS traffic with MITM.",
"fixid": "F-16993r291223_fix",
"fixtext": "If the BIG-IP Core provides intermediary/proxy services for HTTP and HTTPS communications traffic, configure the BIG-IP Core to inspect inbound HTTP and HTTPS communications traffic for protocol compliance and protocol anomalies.",
"iacontrols": null,
"id": "V-215803",
"ruleID": "SV-215803r557356_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound HTTP and HTTPS traffic to virtual servers.",
"version": "F5BI-LT-000307"
},
"V-230213": {
"checkid": "C-16960r291117_chk",
"checktext": "If the BIG-IP Core does not provide user access control intermediary services virtual servers, this is not applicable.\n\nWhen user access control intermediary services are provided, verify the BIG-IP Core initiates a session lock after a 15-minute period of inactivity.\n\nSelect a profile for user sessions.\n\nVerify \"Keep Alive Interval\" under \"Settings\" section is set to \"Specify\" 900.\n\nVerify the BIG-IP LTM is configured to use the Protocol Profile.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect appropriate virtual server.\n\nVerify \"Protocol Profile (Client)\" is set to a profile that limits session timeout.\n\nIf the BIG-IP Core does not initiate a session lock after a 15-minute period of inactivity, this is a finding.",
"description": "A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system, but does not log out because of the temporary nature of the absence. Rather than relying on the user to manually lock their session prior to vacating the vicinity, network elements need to be able to identify when a user's session has idled and take action to initiate the session lock.\n\nThe session lock is implemented at the point where session activity can be determined and/or controlled.\n\nThis policy only applies to gateways (e.g., identity management or authentication gateways) that provide user account services as part of the intermediary services.",
"fixid": "F-16958r291118_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core to initiate a session lock after a 15-minute period of inactivity.",
"iacontrols": null,
"id": "V-230213",
"ruleID": "SV-230213r561158_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to initiate a session lock after a 15-minute period of inactivity when users are connected to virtual servers.",
"version": "F5BI-LT-000141"
},
"V-230214": {
"checkid": "C-16962r291123_chk",
"checktext": "If the BIG-IP Core does not provide user access control intermediary services for virtual servers, this is not applicable.\n\nWhen user access control intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to automatically terminate user sessions for users connected to virtual servers when organization-defined conditions or trigger events occur that require a session disconnect.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify. \n\nVerify under \"Access Policy\" section that \"Access Policy\" has been set to use an APM access policy to automatically terminate a user session when organization-defined conditions or trigger events occur that require a session disconnect.\n\nIf the BIG-IP Core is not configured to automatically terminate a user session when organization-defined conditions or trigger events occur that require a session disconnect, this is a finding.",
"description": "Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., network disconnect). A logical session (for local, network, and remote access) is initiated whenever a user (or process acting on behalf of a user) accesses an organizational information system. Such user sessions can be terminated (and thus terminate user access) without terminating network sessions.\n\nSession termination terminates all processes associated with a user's logical session except those processes that are specifically created by the user (i.e., session owner) to continue after the session is terminated.\n\nThis capability is typically reserved for specific system functionality where the system owner, data owner, or organization requires additional trigger events based on specific mission needs. Conditions or trigger events requiring automatic session termination can include, for example, targeted responses to certain types of incidents and time-of-day restrictions on information system use.\n\nThis policy only applies to gateways (e.g., identity management or authentication gateways) that provide user account services as part of the intermediary services.",
"fixid": "F-16960r291124_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP APM module to automatically terminate a user session when organization-defined conditions or trigger events occur that require a session disconnect.\n\nApply APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to automatically terminate a user session for a user connected to virtual servers when organization-defined conditions or trigger events occur that require a session disconnect.",
"iacontrols": null,
"id": "V-230214",
"ruleID": "SV-230214r561159_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must automatically terminate a user session for a user connected to virtual servers when organization-defined conditions or trigger events occur that require a session disconnect.",
"version": "F5BI-LT-000147"
},
"V-230215": {
"checkid": "C-16963r291126_chk",
"checktext": "If the BIG-IP Core does not provide user access control intermediary services for virtual servers, this is not applicable.\n\nWhen user access control intermediary services are provided, verify the BIG-IP Core is configured as follows:\n\nVerify Virtual Server(s) in the BIG-IP LTM module are configured with an APM policy to display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions when providing access to virtual servers.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect Virtual Servers(s) from the list to verify.\n\nVerify under \"Access Policy\" section, that \"Access Policy\" has been set to use an APM access policy that displays an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.\n\nIf the BIG-IP Core is not configured to display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions, this is a finding.",
"description": "If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether or not the session has been terminated.\n\nLogoff messages for access, for example, can be displayed after authenticated sessions have been terminated. However, for some types of interactive sessions including, for example, remote logon, information systems typically send logoff messages as final messages prior to terminating sessions.\n\nThis policy only applies to ALGs (e.g., identity management or authentication gateways) that provide user account services as part of the intermediary services.",
"fixid": "F-16961r291127_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core as follows:\n\nConfigure a policy in the BIG-IP APM module to display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.\n\nApply APM policy to the applicable Virtual Server(s) in the BIG-IP LTM module to display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions when providing access to virtual servers.",
"iacontrols": null,
"id": "V-230215",
"ruleID": "SV-230215r561160_rule",
"severity": "medium",
"title": "The BIG-IP Core must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions when providing access to virtual servers.",
"version": "F5BI-LT-000151"
},
"V-230216": {
"checkid": "C-16959r291114_chk",
"checktext": "If the BIG-IP Core does not provide user access control intermediary services for virtual servers, this is not applicable.\n\nWhen user access control intermediary services are provided, verify the BIG-IP LTM is configured to conceal, via a session lock, information previously visible on the display with a publicly viewable image.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Profiles >> Protocol >> TCP.\n\nSelect a TCP Profile for user sessions.\n\nVerify \"Reset On Timeout\" is Enabled under the \"Settings\" section\n\nVerify the BIG-IP LTM is configured to use the Protocol Profile.\n\nNavigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.\n\nSelect appropriate virtual server.\n\nVerify \"Protocol Profile (Client)\" is set to a profile that limits session timeout.\n\nIf the BIG-IP Core does not conceal, via a session lock, information previously visible on the display with a publicly viewable image, this is a finding.",
"description": "A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporary nature of the absence.\n\nThe session lock is implemented at the point where session activity can be determined. The network element session lock event must include an obfuscation of the display screen so as to prevent other users from reading what was previously displayed.\n\nPublicly viewable images can include static or dynamic images, for example, patterns used with screen savers, photographic images, solid colors, a clock, a battery life indicator, or a blank screen, with the additional caveat that none of the images convey sensitive information.\n\nThis policy only applies to gateways (e.g., identity management or authentication gateways) that provide user account services as part of the intermediary services.",
"fixid": "F-16957r291115_fix",
"fixtext": "If user access control intermediary services are provided, configure the BIG-IP Core to conceal, via a session lock, information previously visible on the display with a publicly viewable image.",
"iacontrols": null,
"id": "V-230216",
"ruleID": "SV-230216r561161_rule",
"severity": "medium",
"title": "The BIG-IP Core implementation must be configured to activate a session lock to conceal information previously visible on the display for connections to virtual servers.",
"version": "F5BI-LT-000139"
}
},
"profiles": {
"MAC-1_Classified": {
"description": "",
"findings": {
"V-215738": "true",
"V-215739": "true",
"V-215740": "true",
"V-215741": "true",
"V-215742": "true",
"V-215743": "true",
"V-215744": "true",
"V-215745": "true",
"V-215746": "true",
"V-215747": "true",
"V-215748": "true",
"V-215749": "true",
"V-215750": "true",
"V-215751": "true",
"V-215752": "true",
"V-215753": "true",
"V-215754": "true",
"V-215755": "true",
"V-215756": "true",
"V-215757": "true",
"V-215758": "true",
"V-215759": "true",
"V-215760": "true",
"V-215761": "true",
"V-215762": "true",
"V-215763": "true",
"V-215764": "true",
"V-215765": "true",
"V-215766": "true",
"V-215772": "true",
"V-215773": "true",
"V-215774": "true",
"V-215775": "true",
"V-215776": "true",
"V-215777": "true",
"V-215778": "true",
"V-215779": "true",
"V-215780": "true",
"V-215781": "true",
"V-215784": "true",
"V-215788": "true",
"V-215789": "true",
"V-215790": "true",
"V-215791": "true",
"V-215792": "true",
"V-215793": "true",
"V-215794": "true",
"V-215795": "true",
"V-215796": "true",
"V-215797": "true",
"V-215798": "true",
"V-215799": "true",
"V-215800": "true",
"V-215801": "true",
"V-215802": "true",
"V-215803": "true",
"V-230213": "true",
"V-230214": "true",
"V-230215": "true",
"V-230216": "true"
},
"id": "MAC-1_Classified",
"title": "I - Mission Critical Classified"
},
"MAC-1_Public": {
"description": "",
"findings": {
"V-215738": "true",
"V-215739": "true",
"V-215740": "true",
"V-215741": "true",
"V-215742": "true",
"V-215743": "true",
"V-215744": "true",
"V-215745": "true",
"V-215746": "true",
"V-215747": "true",
"V-215748": "true",
"V-215749": "true",
"V-215750": "true",
"V-215751": "true",
"V-215752": "true",
"V-215753": "true",
"V-215754": "true",
"V-215755": "true",
"V-215756": "true",
"V-215757": "true",
"V-215758": "true",
"V-215759": "true",
"V-215760": "true",
"V-215761": "true",
"V-215762": "true",
"V-215763": "true",
"V-215764": "true",
"V-215765": "true",
"V-215766": "true",
"V-215772": "true",
"V-215773": "true",
"V-215774": "true",
"V-215775": "true",
"V-215776": "true",
"V-215777": "true",
"V-215778": "true",
"V-215779": "true",
"V-215780": "true",
"V-215781": "true",
"V-215784": "true",
"V-215788": "true",
"V-215789": "true",
"V-215790": "true",
"V-215791": "true",
"V-215792": "true",
"V-215793": "true",
"V-215794": "true",
"V-215795": "true",
"V-215796": "true",
"V-215797": "true",
"V-215798": "true",
"V-215799": "true",
"V-215800": "true",
"V-215801": "true",
"V-215802": "true",
"V-215803": "true",
"V-230213": "true",
"V-230214": "true",
"V-230215": "true",
"V-230216": "true"
},
"id": "MAC-1_Public",
"title": "I - Mission Critical Public"
},
"MAC-1_Sensitive": {
"description": "",
"findings": {
"V-215738": "true",
"V-215739": "true",
"V-215740": "true",
"V-215741": "true",
"V-215742": "true",
"V-215743": "true",
"V-215744": "true",
"V-215745": "true",
"V-215746": "true",
"V-215747": "true",
"V-215748": "true",
"V-215749": "true",
"V-215750": "true",
"V-215751": "true",
"V-215752": "true",
"V-215753": "true",
"V-215754": "true",
"V-215755": "true",
"V-215756": "true",
"V-215757": "true",
"V-215758": "true",
"V-215759": "true",
"V-215760": "true",
"V-215761": "true",
"V-215762": "true",
"V-215763": "true",
"V-215764": "true",
"V-215765": "true",
"V-215766": "true",
"V-215772": "true",
"V-215773": "true",
"V-215774": "true",
"V-215775": "true",
"V-215776": "true",
"V-215777": "true",
"V-215778": "true",
"V-215779": "true",
"V-215780": "true",
"V-215781": "true",
"V-215784": "true",
"V-215788": "true",
"V-215789": "true",
"V-215790": "true",
"V-215791": "true",
"V-215792": "true",
"V-215793": "true",
"V-215794": "true",
"V-215795": "true",
"V-215796": "true",
"V-215797": "true",
"V-215798": "true",
"V-215799": "true",
"V-215800": "true",
"V-215801": "true",
"V-215802": "true",
"V-215803": "true",
"V-230213": "true",
"V-230214": "true",
"V-230215": "true",
"V-230216": "true"
},
"id": "MAC-1_Sensitive",
"title": "I - Mission Critical Sensitive"
},
"MAC-2_Classified": {
"description": "",
"findings": {
"V-215738": "true",
"V-215739": "true",
"V-215740": "true",
"V-215741": "true",
"V-215742": "true",
"V-215743": "true",
"V-215744": "true",
"V-215745": "true",
"V-215746": "true",
"V-215747": "true",
"V-215748": "true",
"V-215749": "true",
"V-215750": "true",
"V-215751": "true",
"V-215752": "true",
"V-215753": "true",
"V-215754": "true",
"V-215755": "true",
"V-215756": "true",
"V-215757": "true",
"V-215758": "true",
"V-215759": "true",
"V-215760": "true",
"V-215761": "true",
"V-215762": "true",
"V-215763": "true",
"V-215764": "true",
"V-215765": "true",
"V-215766": "true",
"V-215772": "true",
"V-215773": "true",
"V-215774": "true",
"V-215775": "true",
"V-215776": "true",
"V-215777": "true",
"V-215778": "true",
"V-215779": "true",
"V-215780": "true",
"V-215781": "true",
"V-215784": "true",
"V-215788": "true",
"V-215789": "true",
"V-215790": "true",
"V-215791": "true",
"V-215792": "true",
"V-215793": "true",
"V-215794": "true",
"V-215795": "true",
"V-215796": "true",
"V-215797": "true",
"V-215798": "true",
"V-215799": "true",
"V-215800": "true",
"V-215801": "true",
"V-215802": "true",
"V-215803": "true",
"V-230213": "true",
"V-230214": "true",
"V-230215": "true",
"V-230216": "true"
},
"id": "MAC-2_Classified",
"title": "II - Mission Support Classified"
},
"MAC-2_Public": {
"description": "",
"findings": {
"V-215738": "true",
"V-215739": "true",
"V-215740": "true",
"V-215741": "true",
"V-215742": "true",
"V-215743": "true",
"V-215744": "true",
"V-215745": "true",
"V-215746": "true",
"V-215747": "true",
"V-215748": "true",
"V-215749": "true",
"V-215750": "true",
"V-215751": "true",
"V-215752": "true",
"V-215753": "true",
"V-215754": "true",
"V-215755": "true",
"V-215756": "true",
"V-215757": "true",
"V-215758": "true",
"V-215759": "true",
"V-215760": "true",
"V-215761": "true",
"V-215762": "true",
"V-215763": "true",
"V-215764": "true",
"V-215765": "true",
"V-215766": "true",
"V-215772": "true",
"V-215773": "true",
"V-215774": "true",
"V-215775": "true",
"V-215776": "true",
"V-215777": "true",
"V-215778": "true",
"V-215779": "true",
"V-215780": "true",
"V-215781": "true",
"V-215784": "true",
"V-215788": "true",
"V-215789": "true",
"V-215790": "true",
"V-215791": "true",
"V-215792": "true",
"V-215793": "true",
"V-215794": "true",
"V-215795": "true",
"V-215796": "true",
"V-215797": "true",
"V-215798": "true",
"V-215799": "true",
"V-215800": "true",
"V-215801": "true",
"V-215802": "true",
"V-215803": "true",
"V-230213": "true",
"V-230214": "true",
"V-230215": "true",
"V-230216": "true"
},
"id": "MAC-2_Public",
"title": "II - Mission Support Public"
},
"MAC-2_Sensitive": {
"description": "",
"findings": {
"V-215738": "true",
"V-215739": "true",
"V-215740": "true",
"V-215741": "true",
"V-215742": "true",
"V-215743": "true",
"V-215744": "true",
"V-215745": "true",
"V-215746": "true",
"V-215747": "true",
"V-215748": "true",
"V-215749": "true",
"V-215750": "true",
"V-215751": "true",
"V-215752": "true",
"V-215753": "true",
"V-215754": "true",
"V-215755": "true",
"V-215756": "true",
"V-215757": "true",
"V-215758": "true",
"V-215759": "true",
"V-215760": "true",
"V-215761": "true",
"V-215762": "true",
"V-215763": "true",
"V-215764": "true",
"V-215765": "true",
"V-215766": "true",
"V-215772": "true",
"V-215773": "true",
"V-215774": "true",
"V-215775": "true",
"V-215776": "true",
"V-215777": "true",
"V-215778": "true",
"V-215779": "true",
"V-215780": "true",
"V-215781": "true",
"V-215784": "true",
"V-215788": "true",
"V-215789": "true",
"V-215790": "true",
"V-215791": "true",
"V-215792": "true",
"V-215793": "true",
"V-215794": "true",
"V-215795": "true",
"V-215796": "true",
"V-215797": "true",
"V-215798": "true",
"V-215799": "true",
"V-215800": "true",
"V-215801": "true",
"V-215802": "true",
"V-215803": "true",
"V-230213": "true",
"V-230214": "true",
"V-230215": "true",
"V-230216": "true"
},
"id": "MAC-2_Sensitive",
"title": "II - Mission Support Sensitive"
},
"MAC-3_Classified": {
"description": "",
"findings": {
"V-215738": "true",
"V-215739": "true",
"V-215740": "true",
"V-215741": "true",
"V-215742": "true",
"V-215743": "true",
"V-215744": "true",
"V-215745": "true",
"V-215746": "true",
"V-215747": "true",
"V-215748": "true",
"V-215749": "true",
"V-215750": "true",
"V-215751": "true",
"V-215752": "true",
"V-215753": "true",
"V-215754": "true",
"V-215755": "true",
"V-215756": "true",
"V-215757": "true",
"V-215758": "true",
"V-215759": "true",
"V-215760": "true",
"V-215761": "true",
"V-215762": "true",
"V-215763": "true",
"V-215764": "true",
"V-215765": "true",
"V-215766": "true",
"V-215772": "true",
"V-215773": "true",
"V-215774": "true",
"V-215775": "true",
"V-215776": "true",
"V-215777": "true",
"V-215778": "true",
"V-215779": "true",
"V-215780": "true",
"V-215781": "true",
"V-215784": "true",
"V-215788": "true",
"V-215789": "true",
"V-215790": "true",
"V-215791": "true",
"V-215792": "true",
"V-215793": "true",
"V-215794": "true",
"V-215795": "true",
"V-215796": "true",
"V-215797": "true",
"V-215798": "true",
"V-215799": "true",
"V-215800": "true",
"V-215801": "true",
"V-215802": "true",
"V-215803": "true",
"V-230213": "true",
"V-230214": "true",
"V-230215": "true",
"V-230216": "true"
},
"id": "MAC-3_Classified",
"title": "III - Administrative Classified"
},
"MAC-3_Public": {
"description": "",
"findings": {
"V-215738": "true",
"V-215739": "true",
"V-215740": "true",
"V-215741": "true",
"V-215742": "true",
"V-215743": "true",
"V-215744": "true",
"V-215745": "true",
"V-215746": "true",
"V-215747": "true",
"V-215748": "true",
"V-215749": "true",
"V-215750": "true",
"V-215751": "true",
"V-215752": "true",
"V-215753": "true",
"V-215754": "true",
"V-215755": "true",
"V-215756": "true",
"V-215757": "true",
"V-215758": "true",
"V-215759": "true",
"V-215760": "true",
"V-215761": "true",
"V-215762": "true",
"V-215763": "true",
"V-215764": "true",
"V-215765": "true",
"V-215766": "true",
"V-215772": "true",
"V-215773": "true",
"V-215774": "true",
"V-215775": "true",
"V-215776": "true",
"V-215777": "true",
"V-215778": "true",
"V-215779": "true",
"V-215780": "true",
"V-215781": "true",
"V-215784": "true",
"V-215788": "true",
"V-215789": "true",
"V-215790": "true",
"V-215791": "true",
"V-215792": "true",
"V-215793": "true",
"V-215794": "true",
"V-215795": "true",
"V-215796": "true",
"V-215797": "true",
"V-215798": "true",
"V-215799": "true",
"V-215800": "true",
"V-215801": "true",
"V-215802": "true",
"V-215803": "true",
"V-230213": "true",
"V-230214": "true",
"V-230215": "true",
"V-230216": "true"
},
"id": "MAC-3_Public",
"title": "III - Administrative Public"
},
"MAC-3_Sensitive": {
"description": "",
"findings": {
"V-215738": "true",
"V-215739": "true",
"V-215740": "true",
"V-215741": "true",
"V-215742": "true",
"V-215743": "true",
"V-215744": "true",
"V-215745": "true",
"V-215746": "true",
"V-215747": "true",
"V-215748": "true",
"V-215749": "true",
"V-215750": "true",
"V-215751": "true",
"V-215752": "true",
"V-215753": "true",
"V-215754": "true",
"V-215755": "true",
"V-215756": "true",
"V-215757": "true",
"V-215758": "true",
"V-215759": "true",
"V-215760": "true",
"V-215761": "true",
"V-215762": "true",
"V-215763": "true",
"V-215764": "true",
"V-215765": "true",
"V-215766": "true",
"V-215772": "true",
"V-215773": "true",
"V-215774": "true",
"V-215775": "true",
"V-215776": "true",
"V-215777": "true",
"V-215778": "true",
"V-215779": "true",
"V-215780": "true",
"V-215781": "true",
"V-215784": "true",
"V-215788": "true",
"V-215789": "true",
"V-215790": "true",
"V-215791": "true",
"V-215792": "true",
"V-215793": "true",
"V-215794": "true",
"V-215795": "true",
"V-215796": "true",
"V-215797": "true",
"V-215798": "true",
"V-215799": "true",
"V-215800": "true",
"V-215801": "true",
"V-215802": "true",
"V-215803": "true",
"V-230213": "true",
"V-230214": "true",
"V-230215": "true",
"V-230216": "true"
},
"id": "MAC-3_Sensitive",
"title": "III - Administrative Sensitive"
}
},
"slug": "f5_big-ip_local_traffic_manager_11.x",
"title": "F5 BIG-IP Local Traffic Manager 11.x Security Technical Implementation Guide",
"version": "2"
}
}