DISA STIG Palo Alto ALG v2r1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG Palo Alto ALG v2r1

Updated: 3/21/2022

Authority: DISA STIG

Plugin: Palo_Alto

Revision: 1.4

Estimated Item Count: 62

Audit Items

DescriptionCategories
PANW-AG-000015 - The Palo Alto Networks security platform, if used to provide intermediary services for remote access communications traffic (TLS or SSL decryption), must ensure inbound and outbound traffic is monitored for compliance with remote access security policies - TLS/SSL must monitor traffic.

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000016 - The Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000017 - The Palo Alto Networks security platform that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000020 - The Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000024 - The Palo Alto Networks security platform must log violations of security policies.

AUDIT AND ACCOUNTABILITY

PANW-AG-000035 - The Palo Alto Networks security platform must only enable User-ID on trusted zones.

CONFIGURATION MANAGEMENT

PANW-AG-000036 - The Palo Alto Networks security platform must disable WMI probing if it is not used.

CONFIGURATION MANAGEMENT

PANW-AG-000037 - The Palo Alto Networks security platform must not enable the DNS proxy.

CONFIGURATION MANAGEMENT

PANW-AG-000038 - The Palo Alto Networks security platform must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
PANW-AG-000044 - The Palo Alto Networks security platform that provides intermediary services for TLS must validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.

IDENTIFICATION AND AUTHENTICATION

PANW-AG-000047 - The Palo Alto Networks security platform must protect against the use of internal systems from launching Denial of Service (DoS) attacks against other networks or endpoints.

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000049 - The Palo Alto Networks security platform must block phone home traffic.

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000050 - The Palo Alto Networks security platform must deny outbound IP packets that contain an illegitimate address in the source address field.

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000051 - The Palo Alto Networks security platform must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000052 - The Palo Alto Networks security platform must terminate communications sessions after 15 minutes of inactivity.

ACCESS CONTROL

PANW-AG-000060 - The Palo Alto Networks security platform must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.
PANW-AG-000062 - The Palo Alto Networks security platform must drop malicious code upon detection - Antivirus Profiles.

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000062 - The Palo Alto Networks security platform must drop malicious code upon detection - Antivirus Services.

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000063 - The Palo Alto Networks security platform must delete or quarantine malicious code in response to malicious code detection - Antivirus Profiles

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000063 - The Palo Alto Networks security platform must delete or quarantine malicious code in response to malicious code detection - Antivirus Services

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000064 - The Palo Alto Networks security platform must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection - Email Log Forwarding

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000064 - The Palo Alto Networks security platform must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection - Email Servers

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000065 - The Palo Alto Networks security platform must automatically update malicious code protection mechanisms - Download Action

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000065 - The Palo Alto Networks security platform must automatically update malicious code protection mechanisms - Schedule

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000073 - The Palo Alto Networks security platform must deny or restrict detected prohibited mobile code - Antivirus Actions

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000073 - The Palo Alto Networks security platform must deny or restrict detected prohibited mobile code - Antivirus Policies

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000074 - The Palo Alto Networks security platform must prevent the download of prohibited mobile code - Antivirus Profiles

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000074 - The Palo Alto Networks security platform must prevent the download of prohibited mobile code - Antivirus Protocols

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000078 - The Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must control remote access methods (inspect and filter traffic).

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000079 - The Palo Alto Networks security, if used as a TLS gateway/decryption point or VPN concentrator, must provide the capability to immediately disconnect or disable remote access to the information system.
PANW-AG-000080 - To protect against data mining, the Palo Alto Networks security platform must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000081 - To protect against data mining, the Palo Alto Networks security platform must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000094 - The Palo Alto Networks security platform must off-load audit records onto a different system or media than the system being audited - Config Logs

AUDIT AND ACCOUNTABILITY

PANW-AG-000094 - The Palo Alto Networks security platform must off-load audit records onto a different system or media than the system being audited - Log Forwarding

AUDIT AND ACCOUNTABILITY

PANW-AG-000094 - The Palo Alto Networks security platform must off-load audit records onto a different system or media than the system being audited - Syslog

AUDIT AND ACCOUNTABILITY

PANW-AG-000094 - The Palo Alto Networks security platform must off-load audit records onto a different system or media than the system being audited - System Logs

AUDIT AND ACCOUNTABILITY

PANW-AG-000101 - The Palo Alto Networks security platform being used for TLS/SSL decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions.
PANW-AG-000102 - The Palo Alto Networks security platform must protect against Denial of Service (DoS) attacks by employing rate-based attack prevention behavior analysis (traffic thresholds).

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000105 - The Palo Alto Networks security platform must use a Vulnerability Protection Profile that blocks any critical, high, or medium threats.

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000107 - The Palo Alto Networks security platform must only allow incoming communications from organization-defined authorized sources forwarded to organization-defined authorized destinations.
PANW-AG-000109 - The Palo Alto Networks security platform must identify and log internal users associated with prohibited outgoing communications traffic.
PANW-AG-000111 - The Palo Alto Networks security platform must be configured to integrate with a system-wide intrusion detection system.

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000112 - The Palo Alto Networks security platform must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000113 - The Palo Alto Networks security platform must generate a log record when unauthorized network services are detected.

AUDIT AND ACCOUNTABILITY

PANW-AG-000114 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.

SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000115 - The Palo Alto Networks security platform must continuously monitor inbound communications traffic crossing internal security boundaries.
PANW-AG-000116 - The Palo Alto Networks security platform must continuously monitor outbound communications traffic crossing internal security boundaries.
PANW-AG-000118 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.
PANW-AG-000119 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized privileged access is detected - privileged
PANW-AG-000120 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized non-privileged access is detected - non-privileged