STIGQter STIGQter: STIG Summary: CA API Gateway ALG Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 28 Apr 2017:

The CA API Gateway providing user access control intermediary services must limit users to two concurrent sessions.

DISA Rule

SV-85919r1_rule

Vulnerability Number

V-71295

Group Title

SRG-NET-000053-ALG-000001

Rule Version

CAGW-GW-000160

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open the CA API Gateway - Policy Manager.

Select "Tasks" from the main menu and choose "Create Policy". Give the policy a name and select "Global Policy Fragment" from the Policy Type drop-down menu.

Select "message-received" from the Policy Tag drop-down menu and click "OK".

Drag the "Apply Rate Limit" Assertion into the newly created Global Policy Fragment. Set the "Maximum requests per second" and/or "Maximum concurrent requests" and/or "Limit each:" values to meet the organization's requirements.

Click "Save and Activate".

Check Contents

Log on to the CA API Gateway - Policy Manager.

By default, the Gateway has no limit set on the number of concurrent sessions. However, this is configurable in Global Policy.

Check the lower-left corner of the CA API Gateway - Policy Manager to see if a Global Policy for concurrent sessions has been previously configured by an administrator. (Global policies are displayed with a green icon beside their name.)

If the policy does not exist, this is a finding.

If the policy does exist, verify the Rate Limits are set to meet the organization's security requirements.

If the Rate Limits are not set to meet the organization's security requirements, this is a finding.

Vulnerability Number

V-71295

Documentable

False

Rule Version

CAGW-GW-000160

Severity Override Guidance

Log on to the CA API Gateway - Policy Manager.

By default, the Gateway has no limit set on the number of concurrent sessions. However, this is configurable in Global Policy.

Check the lower-left corner of the CA API Gateway - Policy Manager to see if a Global Policy for concurrent sessions has been previously configured by an administrator. (Global policies are displayed with a green icon beside their name.)

If the policy does not exist, this is a finding.

If the policy does exist, verify the Rate Limits are set to meet the organization's security requirements.

If the Rate Limits are not set to meet the organization's security requirements, this is a finding.

Check Content Reference

M

Target Key

3049

Comments