STIGQter STIGQter: STIG Summary: CA API Gateway ALG Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 28 Apr 2017:

The CA API Gateway must only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.

DISA Rule

SV-86071r1_rule

Vulnerability Number

V-71447

Group Title

SRG-NET-000364-ALG-000122

Rule Version

CAGW-GW-000700

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open the CA API Gateway - Policy Manager, select "Tasks" from the main menu, and chose "Manage Listen Ports".

Click the "Manage Firewall Rules" button and add the proper Firewall Rules in accordance with organizational requirements for routing communications between authorized sources and destinations.

Additionally, double-click each of the Registered Services and add the proper logic to route the communications traffic to and from authorized sources and destinations within their policies in accordance with organizational requirements.

Check Contents

Open the CA API Gateway - Policy Manager, select "Tasks" from the main menu, and chose "Manage Listen Ports".

Click the "Manage Firewall Rules" button and verify the proper Firewall Rules have been configured in accordance with organizational requirements for routing communications between authorized sources and destinations.

Additionally, double-click each of the Registered Services and verify their policies have the proper logic to route the communications traffic to and from authorized sources and destinations.

If either the firewall rules or the policy logic is not configured properly, this is a finding.

Vulnerability Number

V-71447

Documentable

False

Rule Version

CAGW-GW-000700

Severity Override Guidance

Open the CA API Gateway - Policy Manager, select "Tasks" from the main menu, and chose "Manage Listen Ports".

Click the "Manage Firewall Rules" button and verify the proper Firewall Rules have been configured in accordance with organizational requirements for routing communications between authorized sources and destinations.

Additionally, double-click each of the Registered Services and verify their policies have the proper logic to route the communications traffic to and from authorized sources and destinations.

If either the firewall rules or the policy logic is not configured properly, this is a finding.

Check Content Reference

M

Target Key

3049

Comments