STIGQter STIGQter: STIG Summary: Firewall Security Requirements Guide

Version: 1

Release: 4 Benchmark Date: 26 Jul 2019

CheckedNameTitle
SV-94115r1_ruleThe firewall must be configured to use filters that use packet headers and packet attributes, including source and destination IP addresses and ports, to prevent the flow of unauthorized or suspicious traffic between interconnected networks with different security policies (including perimeter firewalls and server VLANs).
SV-94117r1_ruleThe firewall must fail closed if the firewall filtering function is nonfunctional.
SV-94119r1_ruleThe firewall must employ filters that prevent or limit the effects of all types of commonly known denial-of-service (DoS) attacks, including flooding, packet sweeps, and unauthorized port scanning.
SV-94121r2_ruleThe firewall must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
SV-94123r1_ruleThe firewall must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services on the network segment in accordance as defined in the Ports, Protocols, and Services Management (PPSM) CAL and vulnerability assessments.
SV-94125r1_ruleThe firewall must block outbound traffic containing denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.
SV-94127r1_ruleThe firewall implementation must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.
SV-94129r1_ruleThe firewall that filters traffic from the VPN access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
SV-94131r1_ruleThe firewall that filters traffic from the wireless access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
SV-94133r1_ruleThe firewall must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.
SV-94135r1_ruleThe firewall must generate traffic log records when traffic is denied, restricted, or discarded.
SV-94137r1_ruleThe firewall must generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
SV-94139r1_ruleThe firewall must be configured to allow authorized users to record a packet capture based IP, traffic type (TCP, UDP, or ICMP), or protocol.
SV-94141r1_ruleThe firewall must generate traffic log entries containing information to establish what type of events occurred.
SV-94143r1_ruleThe firewall must generate traffic log entries containing information to establish when (date and time) the events occurred.
SV-94145r1_ruleThe firewall must generate traffic log entries containing information to establish the location on the network where the events occurred.
SV-94147r1_ruleThe firewall must generate traffic log entries containing information to establish the source of the events, such as the source IP address at a minimum.
SV-94149r1_ruleThe firewall must generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.
SV-94151r1_ruleThe firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries.
SV-94153r1_ruleIf communication with the central audit server is lost, the firewall must generate a real-time alert to, at a minimum, the SCA and ISSO.
SV-94155r1_ruleThe firewall must be configured to send a real-time alert to the ISSO and SA (at a minimum) in the event of an audit processing failure on the firewall itself.
SV-94157r1_ruleIn the event that communication with the central audit server is lost, the firewall must continue to queue traffic log records locally.
SV-94159r1_ruleThe firewall must protect traffic log records from unauthorized access while in transit to the central audit server.
SV-94161r1_ruleThe firewall must protect traffic log records from unauthorized read access while stored locally.
SV-94163r1_ruleThe firewall must protect the traffic log from unauthorized modification of local log records.
SV-94165r1_ruleThe firewall must protect the traffic log from unauthorized deletion of local log files and log records.
SV-94167r1_ruleThe firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
SV-94169r1_ruleThe firewall must fail to a secure state if the firewall filtering functions fail unexpectedly.
SV-94171r1_ruleIn the event of a system failure of the firewall function, the firewall must be configured to save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
SV-94173r1_ruleThe perimeter firewall must be configured for service redundancy, load balancing, or other organization-defined safeguards to limit the effects of types of denial-of-service (DoS) attacks on the network.
SV-94175r1_ruleThe firewall must apply ingress filters to traffic that is inbound to the network through any active external interface.
SV-94177r2_ruleThe firewall must apply egress filters to traffic that is outbound from the network through any internal interface.
SV-94179r2_ruleThe firewall must establish ingress filters that block inbound packets where the destination is an IP address assigned to the management or loopback addresses of the enclave protection devices unless the packet has a source address assigned to the management network or network infrastructure.
SV-94181r1_ruleThe firewall must block or restrict inbound IP packets destined to the control plane of the firewall itself.
SV-94183r1_ruleThe premise firewall (located behind the premise router) must block all outbound management traffic.
SV-94185r1_ruleThe firewall must restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address.
SV-94187r1_ruleThe firewall must block outbound IP packets that contain illegitimate packet attributes including, at a minimum, invalid source address or packets that fail minimum length tests (TCP length, UDP length, IP data length) that have undefined protocol numbers, improper use of hop-by-hop header, or IPv6 RH0 header.
SV-94189r1_ruleThe firewall must be configured to fail securely in the event of an operational failure of the firewall filtering or boundary protection function.
SV-94191r1_ruleThe perimeter firewall must filter traffic destined to the internal enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL), Vulnerability Assessments (VAs) for that the enclave.
SV-94193r1_ruleThe firewall must be configured to allow the system administrator to select a subset of DoD-required auditable events.
SV-94195r1_ruleThe firewall must generate an alert that can be forwarded to, at a minimum, the ISSO and ISSM when denial-of-service (DoS) incidents are detected.