PANW-IP-000033 - To protect against unauthorized data mining, the Palo Alto Networks security platform must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks that use unauthorized data mining techniques to attack applications may result in the compromise of information.

Injection attacks allow an attacker to inject code into a program or query or inject malware onto a computer to execute remote commands that can read or modify a database, or change data on a website. These attacks include buffer overrun, XML, JavaScript, and HTML injections.

IDPS component(s) with the capability to prevent code injections must be included in the IDPS implementation to protect against unauthorized data mining. These components must include rules and anomaly detection algorithms to monitor for atypical database queries or accesses.

Solution

Set a unique hostname.
Go to Device >> Setup >> Management
In the 'General Settings' window, select the 'Edit' icon (the gear symbol in the upper-right corner of the pane).
In the 'General Settings' window, in the 'hostname' field; enter a unique hostname.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_PAN_Y22M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002346, Rule-ID|SV-207701r557390_rule, STIG-ID|PANW-IP-000033, STIG-Legacy|SV-77163, STIG-Legacy|V-62673, Vuln-ID|V-207701

Plugin: Palo_Alto

Control ID: 48d38d26c17b3c4ee08be57c0be31a805d319de4358ef2e088ad68078e0be896