STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated just now
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM DataPower ALG Security Technical Implementation Guide

V-65217

CAT II (Medium)

The DataPower Gateway providing user access control intermediary services must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate user account access authorizations and privileges.

Rule ID

SV-79707r1_rule

STIG

IBM DataPower ALG Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000764

Discussion

User account and privilege validation must be centralized in order to prevent unauthorized access using changed or revoked privileges. ALGs can implement functions such as traffic filtering, authentication, access, and authorization functions based on computer and user privileges. However, the directory service (e.g., Active Directory or LDAP) must not be installed on the ALG, particularly if the gateway resides on the untrusted zone of the Enclave.

Check Content

Using the appliance's WebGUI, navigate to DataPower Gateway's Configure AAA Policy (authentication, authorization, audit) at Objects >> XML Processing >> AAA Policy. 

On the Resource extraction tab, confirm that the correct resource information categories are checked. 

If these items are not configured, this is a finding.

Fix Text

Using the appliance's WebGUI, navigate to DataPower Gateway's Configure AAA Policy (authentication, authorization, audit) at Objects >> XML Processing >> AAA Policy. 

On the Resource extraction tab, specify the correct resource information categories. 

If there is a requirement for resource mapping, on the Resource mapping tab, specify the appropriate method and associated information. 

On the Authorization tab, specify the correct methods, associated information and caching parameters.