STIGQter STIGQter: STIG Summary: Virtual Private Network (VPN) Security Requirements Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The VPN Gateway must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

DISA Rule

SV-207204r608988_rule

Vulnerability Number

V-207204

Group Title

SRG-NET-000132

Rule Version

SRG-NET-000132-VPN-000450

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Ensure functions, ports, protocols, and services identified on the PPSM CAL are not used for system services configuration.

View the configured security services.

Compare the services that are enabled, including the port, services, protocols, and functions.

Consult the product knowledge base and configuration guides to determine the commands for disabling each port, protocols, services, or functions that is not in compliance with the PPSM CAL and vulnerability assessments.

Check Contents

View the configured security services.

Compare the services that are enabled, including the port, services, protocols, and functions.

If functions, ports, protocols, and services identified on the PPSM CAL are not disabled, this is a finding.

Vulnerability Number

V-207204

Documentable

False

Rule Version

SRG-NET-000132-VPN-000450

Severity Override Guidance

View the configured security services.

Compare the services that are enabled, including the port, services, protocols, and functions.

If functions, ports, protocols, and services identified on the PPSM CAL are not disabled, this is a finding.

Check Content Reference

M

Target Key

2920

Comments