Check: SRG-NET-000062-VPN-000200
Virtual Private Network (VPN) SRG:
SRG-NET-000062-VPN-000200
(in versions v3 r3 through v1 r0.1)
Title
The TLS VPN Gateway must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during transmission for remote access connections. (Cat I impact)
Discussion
Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol. NIST SP 800-52 Rev2 provides guidance for client negotiation on either DoD-only or public-facing servers.
Check Content
Verify the TLS VPN Gateway is configured to use TLS 1.2 or higher to protect the confidentiality of sensitive data during transmission. If the TLS VPN Gateway does not use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during transmission, this is a finding.
Fix Text
Configure the TLS VPN Gateway to use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data for transmission.
Additional Identifiers
Rule ID: SV-207190r803417_rule
Vulnerability ID: V-207190
Group Title: SRG-NET-000062
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000068 |
Implement cryptographic mechanisms to protect the confidentiality of remote access sessions. |
Controls
Number | Title |
---|---|
AC-17(2) |
Protection of Confidentiality / Integrity Using Encryption |