STIGQter STIGQter: STIG Summary: CA API Gateway ALG Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 28 Apr 2017:

The CA API Gateway providing content filtering must protect against known and unknown types of Denial of Service (DoS) attacks by employing rate-based attack prevention behavior analysis.

DISA Rule

SV-86067r1_rule

Vulnerability Number

V-71443

Group Title

SRG-NET-000362-ALG-000112

Rule Version

CAGW-GW-000670

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open the CA API Gateway - Policy Manager.

Select "Tasks" from the main menu and choose "Create Policy".

Give the policy a name and select "Global Policy Fragment" from the Policy Type drop-down menu.

Select "message-received" from the Policy Tag drop-down menu and click "OK".

Drag the "Apply Rate Limit" Assertion into the newly created Global Policy Fragment.

Set the "Maximum requests per second" and/or "Maximum concurrent requests" and/or "Limit each:" values to meet the organization's requirements to protect against DoS attacks.

Click "Save and Activate".

Check Contents

Open the CA API Gateway - Policy Manager.

Check the lower-left corner of the CA API Gateway - Policy Manager to see if a Global Policy is set that includes an "Apply Rate Limit" Assertion. (Global policies are displayed with a green icon beside their name.)

If the policy does not exist, this is a finding.

If it does exist, verify the Rate Limits are set to meet the organization's security requirements for DoS Attacks.

If the Rate Limits are not set to meet the organization's security requirements for DoS attacks, this is a finding.

Vulnerability Number

V-71443

Documentable

False

Rule Version

CAGW-GW-000670

Severity Override Guidance

Open the CA API Gateway - Policy Manager.

Check the lower-left corner of the CA API Gateway - Policy Manager to see if a Global Policy is set that includes an "Apply Rate Limit" Assertion. (Global policies are displayed with a green icon beside their name.)

If the policy does not exist, this is a finding.

If it does exist, verify the Rate Limits are set to meet the organization's security requirements for DoS Attacks.

If the Rate Limits are not set to meet the organization's security requirements for DoS attacks, this is a finding.

Check Content Reference

M

Target Key

3049

Comments