F5BI-AP-300002 - The F5 BIG-IP appliance providing intermediary services for remote access communications traffic must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.

Information

Automated monitoring of remote access traffic allows organizations to detect cyberattacks and also ensure ongoing compliance with remote access policies by inspecting connection activities of remote access capabilities.

Remote access methods include both unencrypted and encrypted traffic (e.g., web portals, web content filter, TLS, and webmail). With inbound TLS inspection, the traffic must be inspected prior to being allowed on the enclave's web servers hosting TLS or HTTPS applications. With outbound traffic inspection, traffic must be inspected prior to being forwarded to destinations outside of the enclave, such as external email traffic.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the BIG-IP GUI:
1. Local Traffic.
2. Virtual Servers.
3. Virtual Server List.
4. Click on the name of a virtual server.
5. Security tab >> Policies.
6. Set "Application Security Policy" to "Enabled".
7. Select the policy from the drop-down.
8. Update.
9. Repeat for additional virtual servers.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_TMOS_Y25M07_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17(1), CAT|II, CCI|CCI-000067, Rule-ID|SV-266138r1024835_rule, STIG-ID|F5BI-AP-300002, Vuln-ID|V-266138

Plugin: F5

Control ID: bf67cfa1643572efc3c9e7aa2d558d4f968217d266fb1295f34eb37e88119d52