Skip to content

Application Server Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The application server must produce log records containing sufficient information to establish when (date and time) the events occurred.

    Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining th...
    Rule Medium Severity
  • SRG-APP-000097

    Group
  • SRG-APP-000098

    Group
  • SRG-APP-000099

    Group
  • SRG-APP-000100

    Group
  • The application server must generate log records containing information that establishes the identity of any individual or process associated with the event.

    Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes: time stamps, source a...
    Rule Medium Severity
  • SRG-APP-000101

    Group
  • SRG-APP-000108

    Group
  • The application server must alert the SA and ISSO, at a minimum, in the event of a log processing failure.

    Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the failur...
    Rule Medium Severity
  • SRG-APP-000116

    Group
  • The application server must use internal system clocks to generate time stamps for log records.

    Without the use of an approved and synchronized time source configured on the systems, events cannot be accurately correlated and analyzed to determine what is transpiring within the application se...
    Rule Medium Severity
  • SRG-APP-000118

    Group
  • The application server must protect log information from any type of unauthorized read access.

    If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In ad...
    Rule Medium Severity
  • SRG-APP-000119

    Group
  • SRG-APP-000120

    Group
  • The application server must protect log information from unauthorized deletion.

    If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. App...
    Rule Medium Severity
  • SRG-APP-000121

    Group
  • SRG-APP-000122

    Group
  • SRG-APP-000123

    Group
  • The application server must protect log tools from unauthorized deletion.

    Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may pr...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules