STIGQter STIGQter: STIG Summary: F5 BIG-IP Access Policy Manager 11.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The BIG-IP APM module must enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.

DISA Rule

SV-215714r557355_rule

Vulnerability Number

V-215714

Group Title

SRG-NET-000015-ALG-000016

Rule Version

F5BI-AP-000003

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If user access control intermediary services are provided as part of the traffic management functions of the BIG-IP Core, configure the BIG-IP APM module to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.

Check Contents

If the BIG-IP APM module does not provide user access control intermediary services as part of the traffic management functions of the BIG-IP Core, this is not applicable.

Verify the BIG-IP APM module is configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.

Navigate to the BIG-IP System manager >> Access Policy >> Access Profiles >> Access Profiles List.

Review Access Policy Profiles to verify configuration for authorization by employing identity-based, role-based, and/or attribute-based security policies.

If the BIG-IP APM is not configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies, this is a finding.

Vulnerability Number

V-215714

Documentable

False

Rule Version

F5BI-AP-000003

Severity Override Guidance

If the BIG-IP APM module does not provide user access control intermediary services as part of the traffic management functions of the BIG-IP Core, this is not applicable.

Verify the BIG-IP APM module is configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.

Navigate to the BIG-IP System manager >> Access Policy >> Access Profiles >> Access Profiles List.

Review Access Policy Profiles to verify configuration for authorization by employing identity-based, role-based, and/or attribute-based security policies.

If the BIG-IP APM is not configured to enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies, this is a finding.

Check Content Reference

M

Target Key

4018

Comments