The firewall must be configured to fail securely in the event of an operational failure of the firewall filtering or boundary protection function.

From Firewall Security Requirements Guide

Part of SRG-NET-000365-FW-000038

Associated with: CCI-001126

SV-94189r1_rule The firewall must be configured to fail securely in the event of an operational failure of the firewall filtering or boundary protection function.

Vulnerability discussion

If a boundary protection device fails in an unsecure manner (open), information external to the boundary protection device may enter, or the device may permit unauthorized information release.Secure failure ensures that when a boundary control device fails, all traffic will be subsequently denied.Fail secure is a condition achieved by employing information system mechanisms to ensure that in the event of operational failures of boundary protection devices at managed interfaces (e.g., routers, firewalls, guards, and application gateways residing on protected subnetworks commonly referred to as demilitarized zones), information systems do not enter into unsecure states where intended security properties no longer hold.

Check content

Review the configuration and verify the firewall fails securely in the event of an operational failure. This involves such items as ensuring the Access Control Lists (filters) and security policy are not corrupted and cannot be accessed. Most importantly, it should not be possible to fail to a state where firewall filtering functions no longer hold. If the firewall does not fail securely in the event of an operational failure, this is a finding.

Fix text

Configure the firewall to fail securely in the event of an operational failure of the firewall filtering or boundary protection function. This is not the same as a hardware failure, which is covered by the NDM STIG. This involves such items as ensuring the filters and security policy are not corrupted and cannot be accessed. Most importantly, it should not be possible to fail to a state where firewall filtering functions no longer hold.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer