Logo
Main site Submit a request Sign in
  1. Help Central | G5 Cyber Security
  2. Security Hardening
  3. DISA STIG Palo Alto ALG v2r2

DISA STIG Palo Alto ALG v2r2

Follow New articles New articles and comments
  • DISA_STIG_Palo_Alto_Networks_ALG_STIG_v2r2.audit from DISA Palo Alto Networks ALG v2r2 STIG
  • PANW-AG-000017 - The Palo Alto Networks security platform that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.
  • PANW-AG-000020 - The Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.
  • PANW-AG-000024 - The Palo Alto Networks security platform must log violations of security policies.
  • PANW-AG-000035 - The Palo Alto Networks security platform must only enable User-ID on trusted zones.
  • PANW-AG-000036 - The Palo Alto Networks security platform must disable WMI probing if it is not used.
  • PANW-AG-000037 - The Palo Alto Networks security platform must not enable the DNS proxy.
  • PANW-AG-000038 - The Palo Alto Networks security platform must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
  • PANW-AG-000044 - The Palo Alto Networks security platform that provides intermediary services for TLS must validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.
  • PANW-AG-000047 - The Palo Alto Networks security platform must protect against the use of internal systems from launching Denial of Service (DoS) attacks against other networks or endpoints.
  • PANW-AG-000049 - The Palo Alto Networks security platform must block phone home traffic.
  • PANW-AG-000050 - The Palo Alto Networks security platform must deny outbound IP packets that contain an illegitimate address in the source address field.
  • PANW-AG-000051 - The Palo Alto Networks security platform must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
  • PANW-AG-000052 - The Palo Alto Networks security platform must terminate communications sessions after 15 minutes of inactivity.
  • PANW-AG-000060 - The Palo Alto Networks security platform must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.
  • PANW-AG-000062 - The Palo Alto Networks security platform must drop malicious code upon detection - Antivirus Profiles.
  • PANW-AG-000062 - The Palo Alto Networks security platform must drop malicious code upon detection - Antivirus Services.
  • PANW-AG-000063 - The Palo Alto Networks security platform must delete or quarantine malicious code in response to malicious code detection - Antivirus Profiles
  • PANW-AG-000063 - The Palo Alto Networks security platform must delete or quarantine malicious code in response to malicious code detection - Antivirus Services
  • PANW-AG-000064 - The Palo Alto Networks security platform must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection - Email Log Forwarding
  • PANW-AG-000064 - The Palo Alto Networks security platform must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection - Email Servers
  • PANW-AG-000065 - The Palo Alto Networks security platform must automatically update malicious code protection mechanisms - Download Action
  • PANW-AG-000065 - The Palo Alto Networks security platform must automatically update malicious code protection mechanisms - Schedule
  • PANW-AG-000073 - The Palo Alto Networks security platform must deny or restrict detected prohibited mobile code - Antivirus Actions
  • PANW-AG-000073 - The Palo Alto Networks security platform must deny or restrict detected prohibited mobile code - Antivirus Policies
  • PANW-AG-000074 - The Palo Alto Networks security platform must prevent the download of prohibited mobile code - Antivirus Profiles
  • PANW-AG-000074 - The Palo Alto Networks security platform must prevent the download of prohibited mobile code - Antivirus Protocols
  • PANW-AG-000078 - The Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must control remote access methods (inspect and filter traffic).
  • PANW-AG-000079 - The Palo Alto Networks security, if used as a TLS gateway/decryption point or VPN concentrator, must provide the capability to immediately disconnect or disable remote access to the information system.
  • PANW-AG-000081 - To protect against data mining, the Palo Alto Networks security platform must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
  • 1
  • 2
  • ›
  • »

© Help Central | G5 Cyber Security