Symantec Edge SWG ALG Security Technical Implementation Guide

Overview

VersionDateFinding Count (15)Downloads
V1R12025-12-16CAT I (High): 0CAT II (Medium): 15CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC II - Mission Support Classified

Finding IDSeverityTitleDescription
V-279166
LOWMEDIUMHIGH
The ALG providing user authentication intermediary services must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).Before continuing, the site must follow the configuration steps for adding Common Access Card (CAC) and LDAPS authentication realms and the SSH Consol...
V-279167
LOWMEDIUMHIGH
The Edge SWG must implement multifactor authentication for remote access to nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.For remote access to nonprivileged accounts, one factor of multifactor authentication must be provided by a device separate from the information syste...
V-279168
LOWMEDIUMHIGH
The Edge SWG must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).Ensure a Web Access Policy (under SYME-00-002500) has been created for allow rules or all proxy access will be denied. A deny-all, permit-by-exceptio...
V-279175
LOWMEDIUMHIGH
The Edge SWG must display the standard mandatory DOD-approved notice and consent banner before granting access to the network.Display of a standardized and approved use notification before granting access to the network ensures privacy and security notification verbiage used ...
V-279176
LOWMEDIUMHIGH
The Edge SWG must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.Network element management includes the ability to control the number of users and user sessions that utilize a network element. Limiting the number o...
V-279177
LOWMEDIUMHIGH
The Edge SWG must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.Automated monitoring of remote access traffic allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies by...
V-279178
LOWMEDIUMHIGH
The Edge SWG must be configured to comply with the required TLS settings in NIST SP 800-52.NIST SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthorized versions or inco...
V-279180
LOWMEDIUMHIGH
The Edge SWG must be configured to remove or disable unrelated or unneeded application proxy services.Unrelated or unneeded proxy services increase the attack vector and add excessive complexity to the securing of the ALG. Multiple application proxies ...
V-279187
LOWMEDIUMHIGH
In the event of a system failure of the ALG function, the Edge SWG must save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.Failure in a secure state can address safety or security in accordance with the mission needs of the organization. Failure to a secure state helps pre...
V-279194
LOWMEDIUMHIGH
The Edge SWG must generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries.Providing too much information in error messages risks compromising the data and security of the application and system. Organizations carefully cons...
V-279203
LOWMEDIUMHIGH
The Edge SWG must control remote access methods.Remote access devices, such as those providing remote access to network devices and information systems, lack automated control capabilities, increase...
V-279216
LOWMEDIUMHIGH
The Edge SWG providing user authentication intermediary services must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.Without reauthentication, users may access resources or perform tasks for which they do not have authorization. In addition to the reauthentication r...
V-279217
LOWMEDIUMHIGH
The Edge SWG using PKI-based user authentication must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer authorized (users with revoked...
V-279219
LOWMEDIUMHIGH
The Edge must implement load balancing to limit the effects of known and unknown types of denial-of-service (DoS) attacks.If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Load balancing provides service redund...
V-279222
LOWMEDIUMHIGH
The Edge SWG must fail securely in the event of an operational failure.If a boundary protection device fails in an unsecure manner (open), information external to the boundary protection device may enter, or the device ma...