STIGQter STIGQter: STIG Summary: Palo Alto Networks IDPS Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Palo Alto Networks security platform must continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions.

DISA Rule

SV-207709r557390_rule

Vulnerability Number

V-207709

Group Title

SRG-NET-000390-IDPS-00212

Rule Version

PANW-IP-000049

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The network architecture diagrams must identify where traffic crosses from one internal zone to another. The specific security policy is based on the authorized endpoints, applications, and protocols.

To create or edit a Security Policy:
Go to Policies >> Security
Select "Add" to create a new security policy or select the name of the security policy to edit it.
Configure the specific parameters of the policy by completing the required information in the fields of each tab.
Commit changes by selecting "Commit" in the upper-right corner of the screen. Select "OK" when the confirmation dialog appears.

Check Contents

Obtain the network architecture diagrams and identify where traffic crosses from one internal zone to another and review the configuration of the Palo Alto Networks security platform.
The specific security policy is based on the authorized endpoints, applications, and protocols.

If it does not filter traffic passing between zones, this is a finding.

Vulnerability Number

V-207709

Documentable

False

Rule Version

PANW-IP-000049

Severity Override Guidance

Obtain the network architecture diagrams and identify where traffic crosses from one internal zone to another and review the configuration of the Palo Alto Networks security platform.
The specific security policy is based on the authorized endpoints, applications, and protocols.

If it does not filter traffic passing between zones, this is a finding.

Check Content Reference

M

Target Key

2927

Comments