Kona Site Defender providing content filtering must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-76439 | SRG-NET-000249-ALG-000146 | AKSD-WF-000030 | SV-91135r1_rule | 2017-09-15 | 1 |
Description |
---|
Without an alert, security personnel may be unaware of an impending failure of the audit capability. This will impede the ability to perform forensic analysis and detect rate-based and other anomalies. The ALG generates an immediate (within seconds) alert that notifies designated personnel of the incident. Sending a message to an unattended log or console does not meet this requirement since that will not be seen immediately. These messages should include a severity level indicator or code as an indicator of the criticality of the incident. |
ℹ️ Check |
---|
Confirm Kona Site Defender is configured to alert the ISSO, ISSM, and SA when detection events occur: 1. Log in to the Akamai Luna Portal (Caution-https://control.akamai.com). 2. Click the "Monitor" tab. 3. Under the "Security" section select "Security Monitor". 4. Click the "Notification" button (an icon shaped like a triangle with an exclamation point on the inside) 5. Click the "Configure Notification" button shaped like a plus sign. 6. Confirm that notifications are being sent when "Mitigated" is greater than (>) "1". If the alerts are not being sent, this is a finding. |
✔️ Fix |
---|
Configure Kona Site Defender to alert the ISSO, ISSM, and SA when detection events occur: 1. Log in to the Akamai Luna Portal (Caution-https://control.akamai.com). 2. Click the "Monitor" tab. 3. Under the "Security" section select "Security Monitor". 4. Click the "Notification" button (an icon shaped like a triangle with an exclamation point on the inside) 5. Click the "Configure Notification" button shaped like a plus sign. 6. Click the "Add Notification" button shaped like a plus sign. 7. Click the "Show Advanced View" link. 8. Set the "Notification Name" to "WAF Activity Mitigated" 9. Enter a more detailed description in the “Description” text box. 10. Set the priority to "high". 11. In the "Notify When:" section, set "Mitigated" to greater than (>) 1. 12. Set the “Apply Filter:” dropdowns to “Host Name” and “Contains”, and enter the applicable host name in the text box. 13. Set "During:" to "1 Minute". 14. Set "Notify After:" to "1" occurrences. 15. Select the "Host Name" check box in the "For:" area. 16. Add the ISSO and ISSM emails to the "Email to:" field. 17. Click the “Save” button. |