Broadcom is a trusted partner in highly secure, mission-critical systems around the world, including the US Department of Defense (DOD). In the DOD, all IT systems must adhere to the rigorous Risk Management Framework (RMF) that is defined in DoDI 8510.01. A critical component of RMF is the mandatory implementation of Security Technical Implementation Guides (STIGs) and Security Requirements Guidelines (SRGs) as maintained by the Defense Information Systems Agency (DISA). To serve our customers in the DOD and others who wish to meet the bar set by the DOD, Broadcom has engaged with DISA to produce the Edge SWG STIG through their vendor STIG development process.
To achieve the goal of adhering to the DOD requirements that the STIGs outline, follow the steps in this KB article to learn how to apply policy.
Apply the following policies on your Edge SWG appliance. The policies are written in Content Policy Language (CPL) and are not available as Web VPM objects.
There are 5 CPL layers attached to this KB:
You must add these policy files to the CPL file on the Edge SWG appliance after you perform the following actions on each file:
client_issuer_keyring
is the keyring that the management console listener trusts.service.name
of the H2-Console
is the same service name created in the Configuration > Services > Proxy Services menu of the Admin Console.service.name
of the CAC-MC-Notify
is the same service name created in the Configuration > Services > Proxy Services menu of the Admin Console. service.name
of the HTTPS-Console
is the same as the service name created in the Configuration > Services > Proxy Services menu of the Admin Console.service.name=!H2-Console
to match the name of the H2 Console service under the Configuration > Services > Proxy Services menu of the Admin Console.url.domain=!"tditwbcsg001.dod.local"
to the hostname specific to the deployment environment.service.name=!(CAC-MC-Notify,H2-Console)
match the names of the services under the Configuration > Services > Proxy Services menu of the Admin Console.Once you have downloaded all 5 CPL layers and modified them as noted above, use the Visual Policy Manager (VPM) to copy and paste each of the files into a new CPL layer:
NOTE: Ensure you have created all 5 CPL layers and have placed them in the order shown in the previous image. If they are not in the correct order, move the layers by dragging and dropping them.