Check: WSDP-AG-000038
IBM DataPower ALG STIG:
WSDP-AG-000038
(in version v1 r1)
Title
The DataPower Gateway providing user access control intermediary services must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate user account access authorizations and privileges. (Cat II impact)
Discussion
User account and privilege validation must be centralized in order to prevent unauthorized access using changed or revoked privileges. ALGs can implement functions such as traffic filtering, authentication, access, and authorization functions based on computer and user privileges. However, the directory service (e.g., Active Directory or LDAP) must not be installed on the ALG, particularly if the gateway resides on the untrusted zone of the Enclave.
Check Content
Using the appliance's WebGUI, navigate to DataPower Gateway's Configure AAA Policy (authentication, authorization, audit) at Objects >> XML Processing >> AAA Policy. On the Resource extraction tab, confirm that the correct resource information categories are checked. If these items are not configured, this is a finding.
Fix Text
Using the appliance's WebGUI, navigate to DataPower Gateway's Configure AAA Policy (authentication, authorization, audit) at Objects >> XML Processing >> AAA Policy. On the Resource extraction tab, specify the correct resource information categories. If there is a requirement for resource mapping, on the Resource mapping tab, specify the appropriate method and associated information. On the Authorization tab, specify the correct methods, associated information and caching parameters.
Additional Identifiers
Rule ID: SV-79707r1_rule
Vulnerability ID: V-65217
Group Title: SRG-NET-000138-ALG-000088
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000764 |
The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users). |
Controls
Number | Title |
---|---|
IA-2 |
Identification And Authentication (Organizational Users) |