Details
Unrelated or unneeded proxy services increase the attack vector and add excessive complexity to the securing of the ALG. Multiple application proxies can be installed on many ALGs. However, proxy types must be limited to related functions. At a minimum, the web and email gateway represent different security domains/trust levels. Organizations should also consider separation of gateways that service the DMZ and the trusted network.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Configure Virtual Servers in the BIG-IP LTM module with only proxy services that are related to the purpose of the BIG-IP Core.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system F5.
References
- 800-53|CM-7a.
- CAT|II
- CCI|CCI-000381
- Rule-ID|SV-215756r557356_rule
- STIG-ID|F5BI-LT-000069
- STIG-Legacy|SV-74723
- STIG-Legacy|V-60293
- Vuln-ID|V-215756