STIGQter STIGQter: STIG Summary: Palo Alto Networks ALG Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Palo Alto Networks security platform must continuously monitor inbound communications traffic crossing internal security boundaries.

DISA Rule

SV-228868r557387_rule

Vulnerability Number

V-228868

Group Title

SRG-NET-000390-ALG-000139

Rule Version

PANW-AG-000115

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The network architecture diagrams must identify where traffic crosses from one internal zone to another. The specific security policy is based on the authorized endpoints, applications, and protocols.

To create or edit a Security Policy:
Go to Policies >> Security
Select "Add" to create a new security policy, or select the name of the security policy to edit it.
Configure the specific parameters of the policy by completing the required information in the fields of each tab.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.

Check Contents

Obtain the network architecture diagrams and identify where traffic crosses from one internal zone to another and review the configuration of the Palo Alto Networks security platform.
The specific security policy is based on the authorized endpoints, applications, and protocols.

If it does not monitor traffic passing between zones, this is a finding.

Vulnerability Number

V-228868

Documentable

False

Rule Version

PANW-AG-000115

Severity Override Guidance

Obtain the network architecture diagrams and identify where traffic crosses from one internal zone to another and review the configuration of the Palo Alto Networks security platform.
The specific security policy is based on the authorized endpoints, applications, and protocols.

If it does not monitor traffic passing between zones, this is a finding.

Check Content Reference

M

Target Key

4233

Comments