F5 NGINX Security Technical Implementation Guide

Overview

VersionDateFinding Count (32)Downloads
V1R12026-01-07CAT I (High): 2CAT II (Medium): 30CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC II - Mission Support Sensitive

Finding IDSeverityTitleDescription
V-278380
LOWMEDIUMHIGH
NGINX must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.NGINX management includes the ability to control the number of users and user sessions that use an application. Limiting the number of allowed users a...
V-278382
LOWMEDIUMHIGH
The NGINX service account must be configured to not have shell access.To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD syst...
V-278383
LOWMEDIUMHIGH
The NGINX service account must be configured to not have admin group access.A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design. If information flow is ...
V-278384
LOWMEDIUMHIGH
NGINX must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the application.Display of the DOD-approved use notification before granting access to the application ensures privacy and security notification verbiage used is cons...
V-278385
LOWMEDIUMHIGH
NGINX must provide audit records for DOD-defined auditable events.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident, o...
V-278386
LOWMEDIUMHIGH
NGINX must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the ...
V-278387
LOWMEDIUMHIGH
NGINX must prevent the execution of unapproved modules.Decisions regarding the employment of mobile code within organizational information systems are based on the potential for the code to cause damage to...
V-278388
LOWMEDIUMHIGH
NGINX must protect audit information from unauthorized access.If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity i...
V-278389
LOWMEDIUMHIGH
NGINX must be configured to prohibit or restrict using ports, protocols, and/or services.Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false information into sessions. ...
V-278390
LOWMEDIUMHIGH
NGINX must implement replay-resistant authentication mechanisms for network access.A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the applicati...
V-278391
LOWMEDIUMHIGH
NGINX must be configured to use a Certificate Revocation List (CRL) for certificate path validation and revocation. (Online Certificate Status Protocol [OCSP] is the preferred configuration.)Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly tru...
V-278392
LOWMEDIUMHIGH
NGINX, when using PKI-based authentication, must enforce authorized access to the corresponding private key.If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. Th...
V-278393
LOWMEDIUMHIGH
NGINX must identify prohibited mobile code.Decisions regarding the employment of mobile code within applications are based on the potential for the code to cause damage to the system if used ma...
V-278394
LOWMEDIUMHIGH
NGINX must restrict the ability of individuals to launch denial-of-service (DoS) attacks against other information systems.DoS is a condition in which a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission ...
V-278395
LOWMEDIUMHIGH
NGINX must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.Any application providing too much information in error messages risks compromising the data and security of the application and system. The structure...
V-278397
LOWMEDIUMHIGH
NGINX must restrict access to configuration files.Failure to provide logical access restrictions associated with changes to application configuration may have significant effects on the overall securi...
V-278398
LOWMEDIUMHIGH
NGINX must be configured with a deny-all, permit-by-exception policy to allow the execution of authorized software programs.Using an allowlist provides a configuration management method for allowing the execution of only authorized software. Using only authorized software d...
V-278399
LOWMEDIUMHIGH
NGINX must be configured to require SSL sessions to reauthenticate no longer than 15 minutes.Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When applications provide the capabi...
V-278400
LOWMEDIUMHIGH
NGINX must accept Personal Identity Verification (PIV) credentials.Using PIV credentials facilitates standardization and reduces the risk of unauthorized access. DOD has mandated using the CAC to support identity man...
V-278401
LOWMEDIUMHIGH
NGINX must be configured to expire cached authenticators after an organization-defined time period.If cached authentication information is out of date, the validity of the authentication information may be questionable....
V-278402
LOWMEDIUMHIGH
NGINX must be configured to pass security attributes to proxies.If security attributes are not associated with the information being transmitted between components, then access control policies and information flow...
V-278403
LOWMEDIUMHIGH
NGINX must only allow using DOD approved certificate authorities for PKI.Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DOD syst...
V-278404
LOWMEDIUMHIGH
NGINX must protect against denial-of-service (DoS) attacks.DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-278405
LOWMEDIUMHIGH
NGINX must be configured to use FIPS-approved algorithms to protect the confidentiality and integrity of transmitted information.Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepte...
V-278406
LOWMEDIUMHIGH
NGINX must be configured to use Online Certificate Status Protocol (OCSP) for certificate path validation and revocation. (OCSP is the preferred configuration.)A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path vali...
V-278407
LOWMEDIUMHIGH
NGINX must be configured to use a FIPS-validated cryptographic module for confidentiality and integrity.FIPS 140-2/140-3 precludes using invalidated cryptography for the cryptographic protection of sensitive or valuable data within federal systems. Unval...
V-278408
LOWMEDIUMHIGH
The NGINX service account must be configured to lock changes to the password.Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords ...
V-278409
LOWMEDIUMHIGH
NGINX must separate API maintenance sessions from other network sessions within the system by logically separated communications paths.Nonlocal maintenance and diagnostic activities are conducted by individuals who communicate through either an external or internal network. Communica...
V-278410
LOWMEDIUMHIGH
NGINX must generate, manage, and protect from disclosure and misuse the cryptographic keys that protect access tokens.Identity assertions and access tokens are typically digitally signed. The private keys used to sign these assertions and tokens are protected commensu...
V-278411
LOWMEDIUMHIGH
NGINX must revoke access tokens in accordance with organization-defined identification and authentication policy.An access token is a piece of data that represents the authorization granted to a user or NPE to access specific systems or information resources. Acc...
V-278381
LOWMEDIUMHIGH
NGINX must use TLS 1.2, at a minimum, to protect data confidentiality using remote access.Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that explo...
V-278396
LOWMEDIUMHIGH
NGINX must off-load audit records to a central log server.Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information s...