STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Palo Alto Networks ALG Security Technical Implementation Guide

Version

V3R4

Release Date

Mar 12, 2025

SCAP Benchmark ID

Palo_Alto_Networks_ALG_STIG

Total Checks

50

Tags

network
CAT I: 1CAT II: 46CAT III: 3

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (50)

V-228832MEDIUMThe Palo Alto Networks security platform, if used to provide intermediary services for remote access communications traffic (TLS or SSL decryption), must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.V-228833MEDIUMThe Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.V-228834MEDIUMThe Palo Alto Networks security platform that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.V-228835MEDIUMThe Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.V-228836LOWThe Palo Alto Networks security platform must log violations of security policies.V-228837MEDIUMThe Palo Alto Networks security platform must only enable User-ID on trusted zones.V-228838MEDIUMThe Palo Alto Networks security platform must disable WMI probing if it is not used.V-228839MEDIUMThe Palo Alto Networks security platform must not enable the DNS proxy.V-228840MEDIUMThe Palo Alto Networks security platform must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.V-228841MEDIUMThe Palo Alto Networks security platform that provides intermediary services for TLS must validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.V-228842MEDIUMThe Palo Alto Networks security platform must protect against the use of internal systems for launching denial-of-service (DoS) attacks against external networks or endpoints.V-228843MEDIUMThe Palo Alto Networks security platform must block phone home traffic.V-228844MEDIUMThe Palo Alto Networks security platform must deny outbound IP packets that contain an illegitimate address in the source address field.V-228845MEDIUMThe Palo Alto Networks security platform must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).V-228846MEDIUMThe Palo Alto Networks security platform must terminate communications sessions after 15 minutes of inactivity.V-228847MEDIUMThe Palo Alto Networks security platform must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.V-228848MEDIUMThe Palo Alto Networks security platform must drop malicious code upon detection.V-228849MEDIUMThe Palo Alto Networks security platform must delete or quarantine malicious code in response to malicious code detection.V-228850MEDIUMThe Palo Alto Networks security platform must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection.V-228851MEDIUMThe Palo Alto Networks security platform must automatically update malicious code protection mechanisms.V-228852MEDIUMThe Palo Alto Networks security platform must deny or restrict detected prohibited mobile code.V-228853MEDIUMThe Palo Alto Networks security platform must prevent the download of prohibited mobile code.V-228854MEDIUMThe Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must control remote access methods (inspect and filter traffic).V-228855MEDIUMThe Palo Alto Networks security, if used as a TLS gateway/decryption point or VPN concentrator, must provide the capability to immediately disconnect or disable remote access to the information system.V-228856MEDIUMTo protect against data mining, the Palo Alto Networks security platform must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.V-228857MEDIUMTo protect against data mining, the Palo Alto Networks security platform must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.V-228858MEDIUMThe Palo Alto Networks security platform must off-load audit records onto a different system or media than the system being audited.V-228859MEDIUMThe Palo Alto Networks security platform being used for TLS/SSL decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions.V-228860HIGHThe Palo Alto Networks security platform must protect against denial-of-service (DoS) attacks from external sources.V-228861MEDIUMThe Palo Alto Networks security platform must use a Vulnerability Protection Profile that blocks any critical, high, or medium threats.V-228862MEDIUMThe Palo Alto Networks security platform must only allow incoming communications from organization-defined authorized sources forwarded to organization-defined authorized destinations.V-228863MEDIUMThe Palo Alto Networks security platform must identify and log internal users associated with prohibited outgoing communications traffic.V-228864LOWThe Palo Alto Networks security platform must be configured to integrate with a system-wide intrusion detection system.V-228865MEDIUMThe Palo Alto Networks security platform must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.V-228866MEDIUMThe Palo Alto Networks security platform must generate a log record when unauthorized network services are detected.V-228867MEDIUMThe Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.V-228868MEDIUMThe Palo Alto Networks security platform must continuously monitor inbound communications traffic crossing internal security boundaries.V-228869MEDIUMThe Palo Alto Networks security platform must continuously monitor outbound communications traffic crossing internal security boundaries.V-228870MEDIUMThe Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.V-228871MEDIUMThe Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized privileged access is detected.V-228872MEDIUMThe Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software that allows unauthorized nonprivileged access is detected.V-228873MEDIUMThe Palo Alto Networks security platform must generate a log record that can be used to send an alert to, at a minimum, the information system security officer (ISSO) and information system security manager (ISSM) when denial-of-service (DoS) incidents are detected.V-228874MEDIUMThe Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.V-228875MEDIUMThe Palo Alto Networks security platform must block traceroutes and ICMP probes originating from untrusted networks (e.g., ISP and other non-DoD networks).V-228876MEDIUMThe Palo Alto Networks security platform providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.V-228877MEDIUMThe Palo Alto Networks security platform, if used for TLS/SSL decryption, must use NIST FIPS-validated cryptography to implement encryption.V-228878LOWThe Palo Alto Networks security platform must, at a minimum, off-load threat and traffic log records onto a centralized log server in real time.V-228879MEDIUMThe Palo Alto Networks security platform must inspect inbound and outbound SMTP and Extended SMTP communications traffic (if authorized) for protocol compliance and protocol anomalies.V-228880MEDIUMThe Palo Alto Networks security platform must inspect inbound and outbound FTP and FTPS communications traffic (if authorized) for protocol compliance and protocol anomalies.V-228881MEDIUMThe Palo Alto Networks security platform must inspect inbound and outbound HTTP traffic (if authorized) for protocol compliance and protocol anomalies.