Skip to content

Application Server Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000297

    Group
  • The application server management interface must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.

    Providing a logout capability to the user allows the user to explicitly close a session and free those resources used during the session. If a user cannot explicitly end an application session, th...
    Rule Medium Severity
  • SRG-APP-000313

    Group
  • SRG-APP-000314

    Group
  • The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission.

    The application server provides a framework for applications to communicate between each other to form an overall well-designed application to perform a task. As the information is transmitted, th...
    Rule Medium Severity
  • SRG-APP-000315

    Group
  • SRG-APP-000316

    Group
  • The application server must provide the capability to immediately disconnect or disable remote access to the management interface.

    Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking progress would not be immediately stopped. The application server must have the capabil...
    Rule Medium Severity
  • SRG-APP-000340

    Group
  • The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Restrict...
    Rule Medium Severity
  • SRG-APP-000343

    Group
  • The application server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.

    In order to be able to provide a forensic history of activity, the application server must ensure users who are granted a privileged role or those who utilize a separate distinct account when acces...
    Rule Medium Severity
  • SRG-APP-000357

    Group
  • The application server must allocate log record storage capacity in accordance with organization-defined log record storage requirements.

    The proper management of log records not only dictates proper archiving processes and procedures be established, it also requires allocating enough storage space to maintain the logs online for a d...
    Rule Medium Severity
  • SRG-APP-000358

    Group
  • SRG-APP-000359

    Group
  • The application server must provide an immediate warning to the SA and ISSO, at a minimum, when allocated log record storage volume reaches 75% of maximum log record storage capacity.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the lo...
    Rule Medium Severity
  • SRG-APP-000360

    Group
  • The application server must provide an immediate real-time alert to authorized users of all log failure events requiring real-time alerts.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the lo...
    Rule Medium Severity
  • SRG-APP-000371

    Group
  • The application server must compare internal application server clocks at least every 24 hours with an authoritative time source.

    Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events. Synchronization of system clocks is ...
    Rule Medium Severity
  • SRG-APP-000372

    Group
  • The application server must synchronize internal application server clocks to an authoritative time source when the time difference is greater than the organization-defined time period.

    Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events. Synchronization of internal applicat...
    Rule Medium Severity
  • SRG-APP-000374

    Group
  • SRG-APP-000375

    Group
  • The application server must record time stamps for log records that meet a granularity of one second for a minimum degree of precision.

    To investigate an incident, the log records should be easily put into chronological order. Without sufficient granularity of time stamps, the chronological order cannot be determined. Time stamps...
    Rule Medium Severity
  • SRG-APP-000380

    Group
  • SRG-APP-000381

    Group
  • The application server must log the enforcement actions used to restrict access associated with changes to the application server.

    Without logging the enforcement of access restrictions against changes to the application server configuration, it will be difficult to identify attempted attacks, and a log trail will not be avail...
    Rule Medium Severity
  • SRG-APP-000389

    Group
  • SRG-APP-000391

    Group
  • SRG-APP-000392

    Group
  • The application server must electronically verify Personal Identity Verification (PIV) credentials for access to the management interface.

    The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized access. PIV credentials are only used in an unclassified environment. ...
    Rule High Severity
  • SRG-APP-000400

    Group
  • The application server must prohibit the use of cached authenticators after an organization-defined time period.

    When the application server is using PKI authentication, a local revocation cache must be stored for instances when the revocation cannot be authenticated through the network, but if cached authent...
    Rule Medium Severity
  • SRG-APP-000401

    Group
  • SRG-APP-000402

    Group
  • The application server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.

    Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requir...
    Rule Medium Severity
  • SRG-APP-000403

    Group
  • SRG-APP-000404

    Group
  • The application server must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.

    Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted. This requirement typically applies to organizational information systems that are accessible to...
    Rule Medium Severity
  • SRG-APP-000405

    Group
  • SRG-APP-000427

    Group
  • SRG-APP-000428

    Group
  • The application server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.

    Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an application server. Alternative physical protection...
    Rule Medium Severity
  • SRG-APP-000429

    Group
  • The application must implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components.

    Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an application server. Alternative physical protection...
    Rule Medium Severity
  • SRG-APP-000435

    Group
  • SRG-APP-000435

    Group
  • SRG-APP-000439

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules