Akamai KSD Service IL2 STIG Version 1 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Akamai KSD Service IL2 ALG STIG Version 1
- Defense Information Systems Agency
-
Download Standalone XCCDF 1.1.4 - Akamai KSD Service IL2 NDM STIG Version 1
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Akamai Kona Site Defender Service Impact Level 2 | cpe:/a:akamai:kona_site_defender_service (View CVEs) |
Checklist Highlights
- Checklist Name:
- Akamai KSD Service IL2 STIG
- Checklist ID:
- 814
- Version:
- Version 1
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 09/19/2017
Checklist Summary:
Akamai Kona Site Defender (KSD) Service Impact Level 2 (IL2) Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to the Akamai KSD configuration and administrative web portal access. The Akamai KSD is a cloud service providing web application firewall (WAF) protections inline between web servers and users. This Akamai KSD Service IL2 STIG provides technical guidance for configuring the management portal and the WAF itself. The management portal guidance is based on the Network Device Management (NDM) Security Requirements Guide (SRG), which covers authentication, authorization, audit, and user access. The WAF, to include the optional Client Reputation module, is based on the Application Layer Gateway (ALG) SRG, which includes reverse proxy, protocol/port filtering, and protocol header inspection. The scope of the Akamai KSD Service IL2 STIG limits implementation to Impact Level 2 as defined in the Cloud Computing SRG. For implementations of higher Impact Levels, further risk evaluation will need to be performed using the ALG SRG requirements for those intermediary services implemented, such as remote access control and user authentication/authorization. Further, higher Impact Levels must meet the requirements set forth in the Internet NIPRNet DoD
Checklist Role:
- Business Productivity Application
Known Issues:
Not provided.
Target Audience:
Not provided.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DoD Instruction (DoDI) 8500.01
Comments/Warnings/Miscellaneous:
All technical NIST SP 800-53 requirements were considered while developing this STIG. Requirements that are applicable and configurable will be included in the final STIG. A report marked For Official Use Only (FOUO) will be available for those items that did not meet requirements. This report will be available to component Authorizing Official (AO) personnel for risk assessment purposes by request via email to: disa.stig_spt@mail.mil.
Disclaimer:
Not provided.
Product Support:
Parties within the DoD and Federal Government’s computing environments can obtain the applicable STIG from the Information Assurance Support Environment (IASE) website. This site contains the latest copies of any STIGs, SRGs, and other related security information. The address for the IASE site is http://iase.disa.mil/.
Point of Contact:
disa.stig_spt@mail.mil
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Updated information to reflect executive summary - 11/20/2017 Moved to FINAL - 03/30/2018
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|---|
https://iasecontent.disa.mil/stigs/pdf/U_Akamai_KSD_STIG_Ver1_Release_Memo.pdf | Akamai KSD Service IL2 STIG Version 1 Release Memo |
https://iasecontent.disa.mil/stigs/zip/U_Akamai_KSD_Service_IL2_V1R1_Overview.zip | Akamai KSD Service IL2 STIG Overview |